diff options
4053 files changed, 160516 insertions, 486 deletions
diff --git a/tests/wpt/metadata/MANIFEST.json b/tests/wpt/metadata/MANIFEST.json index 33bc60aa83c..0dee8a56d65 100644 --- a/tests/wpt/metadata/MANIFEST.json +++ b/tests/wpt/metadata/MANIFEST.json @@ -105694,7 +105694,7 @@ "css/compositing/svg/mix-blend-mode-in-svg-image.html", [ [ - "/css/compositing/svg/reference/mix-blend-mode-svg-rectangle-ref.html", + "/css/compositing/svg/reference/mix-blend-mode-in-svg-image-ref.html", "==" ] ], @@ -140947,6 +140947,18 @@ {} ] ], + "css/css-pseudo/marker-content-021.html": [ + [ + "css/css-pseudo/marker-content-021.html", + [ + [ + "/css/css-pseudo/marker-content-021-ref.html", + "==" + ] + ], + {} + ] + ], "css/css-pseudo/marker-display-dynamic-001.html": [ [ "css/css-pseudo/marker-display-dynamic-001.html", @@ -144439,6 +144451,18 @@ {} ] ], + "css/css-sizing/ortho-writing-mode-001.html": [ + [ + "css/css-sizing/ortho-writing-mode-001.html", + [ + [ + "/css/reference/ref-filled-green-100px-square.xht", + "==" + ] + ], + {} + ] + ], "css/css-sizing/orthogonal-writing-mode-float-in-inline.html": [ [ "css/css-sizing/orthogonal-writing-mode-float-in-inline.html", @@ -201509,6 +201533,18 @@ {} ] ], + "document-policy/font-display/font-display-document-policy-01.tentative.html": [ + [ + "document-policy/font-display/font-display-document-policy-01.tentative.html", + [ + [ + "/document-policy/font-display/font-display-document-policy-01.tentative-ref.html", + "==" + ] + ], + {} + ] + ], "dom/nodes/remove-from-shadow-host-and-adopt-into-iframe.html": [ [ "dom/nodes/remove-from-shadow-host-and-adopt-into-iframe.html", @@ -245276,6 +245312,9 @@ "css/compositing/root-element-opacity-ref.html": [ [] ], + "css/compositing/svg/reference/mix-blend-mode-in-svg-image-ref.html": [ + [] + ], "css/compositing/svg/reference/mix-blend-mode-svg-rectangle-ref.html": [ [] ], @@ -255473,6 +255512,9 @@ "css/css-pseudo/marker-content-020-ref.html": [ [] ], + "css/css-pseudo/marker-content-021-ref.html": [ + [] + ], "css/css-pseudo/marker-font-properties-ref.html": [ [] ], @@ -266723,6 +266765,12 @@ "document-policy/echo-policy.py": [ [] ], + "document-policy/font-display/font-display-document-policy-01.tentative-ref.html": [ + [] + ], + "document-policy/font-display/font-display-document-policy-01.tentative.html.headers": [ + [] + ], "document-policy/required-policy/document-policy.html.headers": [ [] ], @@ -267050,6 +267098,24 @@ "domparsing/insert_adjacent_html.js": [ [] ], + "domparsing/resources/domparser-iframe-base-pushstate.html": [ + [] + ], + "domparsing/resources/domparser-iframe-base.html": [ + [] + ], + "domparsing/resources/domparser-iframe-pushstate.html": [ + [] + ], + "domparsing/resources/domparser-iframe.html": [ + [] + ], + "domparsing/resources/domparser-iframe.js": [ + [] + ], + "domparsing/resources/domparser-url-tests.js": [ + [] + ], "domxpath/META.yml": [ [] ], @@ -275432,6 +275498,9 @@ "html/semantics/scripting-1/the-script-element/execution-timing/pages/helloworld.html": [ [] ], + "html/semantics/scripting-1/the-script-element/execution-timing/scripts/check-style-sheet.js": [ + [] + ], "html/semantics/scripting-1/the-script-element/execution-timing/scripts/count-script-tags.js": [ [] ], @@ -281714,6 +281783,90 @@ "referrer-policy/css-integration/css-test-helper.js": [ [] ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html.headers": [ + [] + ], "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.headers": [ [] ], @@ -281750,6 +281903,186 @@ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.headers": [ [] ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/a-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/a-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/a-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/a-tag/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-https.swap-origin.http.html.headers": [ + [] + ], "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.keep-origin.http.html.headers": [ [] ], @@ -281786,6 +282119,186 @@ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/same-https.swap-origin.http.html.headers": [ [] ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/sharedworker-classic/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/sharedworker-classic/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/sharedworker-module/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/sharedworker-module/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/worker-classic/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/worker-classic/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/worker-module/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/worker-module/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/a-tag/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html.headers": [ + [] + ], "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.headers": [ [] ], @@ -281822,6 +282335,186 @@ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.headers": [ [] ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/a-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/a-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/a-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/a-tag/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-https.swap-origin.http.html.headers": [ + [] + ], "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.keep-origin.http.html.headers": [ [] ], @@ -281858,6 +282551,171 @@ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/same-https.swap-origin.http.html.headers": [ [] ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/sharedworker-classic/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/sharedworker-classic/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/sharedworker-module/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/sharedworker-module/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/worker-classic/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/worker-classic/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/worker-module/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/worker-module/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/a-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/a-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/a-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/same-https.swap-origin.http.html.headers": [ + [] + ], "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.keep-origin.http.html.headers": [ [] ], @@ -281888,6 +282746,174 @@ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/same-https.swap-origin.http.html.headers": [ [] ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/sharedworker-module/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/sharedworker-module/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/worker-module/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/worker-module/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/a-tag/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html.headers": [ + [] + ], "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.headers": [ [] ], @@ -281924,6 +282950,186 @@ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.headers": [ [] ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/a-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/a-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/a-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/a-tag/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-https.swap-origin.http.html.headers": [ + [] + ], "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.keep-origin.http.html.headers": [ [] ], @@ -281960,6 +283166,186 @@ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/same-https.swap-origin.http.html.headers": [ [] ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/sharedworker-classic/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/sharedworker-classic/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/sharedworker-module/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/sharedworker-module/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/worker-classic/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/worker-classic/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/worker-module/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/worker-module/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html.headers": [ + [] + ], "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html.headers": [ [] ], @@ -281996,6 +283382,102 @@ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html.headers": [ [] ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/sharedworker-module/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/sharedworker-module/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html.headers": [ + [] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html.headers": [ + [] + ], "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html.headers": [ [] ], @@ -282158,6 +283640,12 @@ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.headers": [ [] ], + "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html.headers": [ + [] + ], "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.headers": [ [] ], @@ -282368,6 +283856,12 @@ "referrer-policy/gen/top.http-rp/no-referrer/sharedworker-classic/same-http.no-redirect.http.html.headers": [ [] ], + "referrer-policy/gen/top.http-rp/no-referrer/sharedworker-module/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/top.http-rp/no-referrer/sharedworker-module/same-http.no-redirect.http.html.headers": [ + [] + ], "referrer-policy/gen/top.http-rp/no-referrer/worker-classic/same-http.keep-origin.http.html.headers": [ [] ], @@ -282578,6 +284072,12 @@ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers": [ [] ], + "referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html.headers": [ + [] + ], "referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers": [ [] ], @@ -282788,6 +284288,12 @@ "referrer-policy/gen/top.http-rp/origin/sharedworker-classic/same-http.no-redirect.http.html.headers": [ [] ], + "referrer-policy/gen/top.http-rp/origin/sharedworker-module/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/top.http-rp/origin/sharedworker-module/same-http.no-redirect.http.html.headers": [ + [] + ], "referrer-policy/gen/top.http-rp/origin/worker-classic/same-http.keep-origin.http.html.headers": [ [] ], @@ -282971,6 +284477,12 @@ "referrer-policy/gen/top.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html.headers": [ [] ], + "referrer-policy/gen/top.http-rp/same-origin/sharedworker-module/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/top.http-rp/same-origin/sharedworker-module/same-http.no-redirect.http.html.headers": [ + [] + ], "referrer-policy/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html.headers": [ [] ], @@ -283175,6 +284687,12 @@ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers": [ [] ], + "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html.headers": [ + [] + ], "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers": [ [] ], @@ -283385,6 +284903,12 @@ "referrer-policy/gen/top.http-rp/strict-origin/sharedworker-classic/same-http.no-redirect.http.html.headers": [ [] ], + "referrer-policy/gen/top.http-rp/strict-origin/sharedworker-module/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/top.http-rp/strict-origin/sharedworker-module/same-http.no-redirect.http.html.headers": [ + [] + ], "referrer-policy/gen/top.http-rp/strict-origin/worker-classic/same-http.keep-origin.http.html.headers": [ [] ], @@ -283595,6 +285119,12 @@ "referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.headers": [ [] ], + "referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-module/same-http.keep-origin.http.html.headers": [ + [] + ], + "referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-module/same-http.no-redirect.http.html.headers": [ + [] + ], "referrer-policy/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html.headers": [ [] ], @@ -292199,6 +293729,12 @@ "vibration/META.yml": [ [] ], + "video-raf/META.yml": [ + [] + ], + "video-raf/README.md": [ + [] + ], "visual-viewport/META.yml": [ [] ], @@ -292580,6 +294116,18 @@ "webaudio/the-audio-api/the-audioworklet-interface/processors/channel-count-processor.js": [ [] ], + "webaudio/the-audio-api/the-audioworklet-interface/processors/construction-port-new-after-new.js": [ + [] + ], + "webaudio/the-audio-api/the-audioworklet-interface/processors/construction-port-new-after-super.js": [ + [] + ], + "webaudio/the-audio-api/the-audioworklet-interface/processors/construction-port-singleton.js": [ + [] + ], + "webaudio/the-audio-api/the-audioworklet-interface/processors/construction-port-super-after-new.js": [ + [] + ], "webaudio/the-audio-api/the-audioworklet-interface/processors/dummy-processor.js": [ [] ], @@ -292607,6 +294155,15 @@ "webaudio/the-audio-api/the-audioworklet-interface/processors/port-processor.js": [ [] ], + "webaudio/the-audio-api/the-audioworklet-interface/processors/process-getter-test-instance-processor.js": [ + [] + ], + "webaudio/the-audio-api/the-audioworklet-interface/processors/process-getter-test-prototype-processor.js": [ + [] + ], + "webaudio/the-audio-api/the-audioworklet-interface/processors/process-parameter-test-processor.js": [ + [] + ], "webaudio/the-audio-api/the-audioworklet-interface/processors/sharedarraybuffer-processor.js": [ [] ], @@ -317357,6 +318914,12 @@ {} ] ], + "content-security-policy/reporting/report-clips-sample.html": [ + [ + "content-security-policy/reporting/report-clips-sample.html", + {} + ] + ], "content-security-policy/reporting/report-cross-origin-no-cookies.sub.html": [ [ "content-security-policy/reporting/report-cross-origin-no-cookies.sub.html", @@ -326793,6 +328356,12 @@ {} ] ], + "css/css-images/image-set/image-set-parsing.html": [ + [ + "css/css-images/image-set/image-set-parsing.html", + {} + ] + ], "css/css-images/inheritance.html": [ [ "css/css-images/inheritance.html", @@ -343112,12 +344681,42 @@ } ] ], + "domparsing/DOMParser-parseFromString-encoding.html": [ + [ + "domparsing/DOMParser-parseFromString-encoding.html", + {} + ] + ], "domparsing/DOMParser-parseFromString-html.html": [ [ "domparsing/DOMParser-parseFromString-html.html", {} ] ], + "domparsing/DOMParser-parseFromString-url-base-pushstate.html": [ + [ + "domparsing/DOMParser-parseFromString-url-base-pushstate.html", + {} + ] + ], + "domparsing/DOMParser-parseFromString-url-base.html": [ + [ + "domparsing/DOMParser-parseFromString-url-base.html", + {} + ] + ], + "domparsing/DOMParser-parseFromString-url-pushstate.html": [ + [ + "domparsing/DOMParser-parseFromString-url-pushstate.html", + {} + ] + ], + "domparsing/DOMParser-parseFromString-url.html": [ + [ + "domparsing/DOMParser-parseFromString-url.html", + {} + ] + ], "domparsing/DOMParser-parseFromString-xml-doctype.html": [ [ "domparsing/DOMParser-parseFromString-xml-doctype.html", @@ -369641,12 +371240,60 @@ {} ] ], + "html/semantics/scripting-1/the-script-element/execution-timing/106-defer-import.html": [ + [ + "html/semantics/scripting-1/the-script-element/execution-timing/106-defer-import.html", + {} + ] + ], + "html/semantics/scripting-1/the-script-element/execution-timing/106-defer-noimport.html": [ + [ + "html/semantics/scripting-1/the-script-element/execution-timing/106-defer-noimport.html", + {} + ] + ], + "html/semantics/scripting-1/the-script-element/execution-timing/106-external-import.html": [ + [ + "html/semantics/scripting-1/the-script-element/execution-timing/106-external-import.html", + {} + ] + ], + "html/semantics/scripting-1/the-script-element/execution-timing/106-external-module-import.html": [ + [ + "html/semantics/scripting-1/the-script-element/execution-timing/106-external-module-import.html", + {} + ] + ], + "html/semantics/scripting-1/the-script-element/execution-timing/106-external-module-noimport.html": [ + [ + "html/semantics/scripting-1/the-script-element/execution-timing/106-external-module-noimport.html", + {} + ] + ], + "html/semantics/scripting-1/the-script-element/execution-timing/106-external-noimport.html": [ + [ + "html/semantics/scripting-1/the-script-element/execution-timing/106-external-noimport.html", + {} + ] + ], "html/semantics/scripting-1/the-script-element/execution-timing/106-import.html": [ [ "html/semantics/scripting-1/the-script-element/execution-timing/106-import.html", {} ] ], + "html/semantics/scripting-1/the-script-element/execution-timing/106-module-import.html": [ + [ + "html/semantics/scripting-1/the-script-element/execution-timing/106-module-import.html", + {} + ] + ], + "html/semantics/scripting-1/the-script-element/execution-timing/106-module-noimport.html": [ + [ + "html/semantics/scripting-1/the-script-element/execution-timing/106-module-noimport.html", + {} + ] + ], "html/semantics/scripting-1/the-script-element/execution-timing/106-noimport.html": [ [ "html/semantics/scripting-1/the-script-element/execution-timing/106-noimport.html", @@ -392068,7 +393715,9 @@ "paint-timing/first-image-child.html": [ [ "paint-timing/first-image-child.html", - {} + { + "timeout": "long" + } ] ], "paint-timing/first-paint-bg-color.html": [ @@ -404097,6 +405746,7650 @@ {} ] ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/no-referrer/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/img-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/img-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/img-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/img-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/img-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/img-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/img-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/img-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/origin/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/origin/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/img-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/img-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/img-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/img-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/img-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/img-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/img-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/img-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/img-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/img-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/img-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/img-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/img-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/img-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/img-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/img-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/same-origin/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/same-origin/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/strict-origin/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/img-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/img-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/img-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/img-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/img-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/img-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/img-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/img-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.http-rp/unset/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.http-rp/unset/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/img-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/img-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/img-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/img-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/img-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/img-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/img-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/img-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/img-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/img-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/img-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/img-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/img-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/img-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/img-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/img-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/img-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/img-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/img-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/img-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/no-referrer/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/no-referrer/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/img-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/img-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/img-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/img-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/img-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/img-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/img-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/img-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/img-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/img-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/img-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/img-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/img-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/img-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/img-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/img-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/img-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/img-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/img-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/img-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/origin/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/origin/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/img-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/img-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/img-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/img-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/img-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/img-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/img-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/img-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/img-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/img-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/img-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/img-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/img-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/img-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/img-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/img-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/same-origin/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/same-origin/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/strict-origin/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/strict-origin/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unsafe-url/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unsafe-url/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/img-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/img-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/img-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/img-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/img-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/img-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/img-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/img-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/img-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/img-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/img-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/img-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/img-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/img-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/img-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/img-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/img-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/img-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/img-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/img-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/img-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/img-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/img-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/img-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/iframe.meta/unset/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/iframe.meta/unset/xhr/same-https.swap-origin.http.html", + {} + ] + ], "referrer-policy/gen/req.attr/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html": [ [ "referrer-policy/gen/req.attr/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html", @@ -405975,6 +415268,198 @@ {} ] ], + "referrer-policy/gen/req.rel-noref/no-referrer/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/req.rel-noref/no-referrer/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/req.rel-noref/no-referrer/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/req.rel-noref/no-referrer/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/req.rel-noref/no-referrer/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/req.rel-noref/no-referrer/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/req.rel-noref/no-referrer/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/req.rel-noref/no-referrer/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html": [ [ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html", @@ -406047,6 +415532,366 @@ {} ] ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.keep-origin.http.html": [ [ "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.keep-origin.http.html", @@ -406119,6 +415964,366 @@ {} ] ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html": [ [ "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html", @@ -406191,6 +416396,366 @@ {} ] ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.keep-origin.http.html": [ [ "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.keep-origin.http.html", @@ -406263,6 +416828,336 @@ {} ] ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.keep-origin.http.html": [ [ "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.keep-origin.http.html", @@ -406323,6 +417218,342 @@ {} ] ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html": [ [ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html", @@ -406395,6 +417626,366 @@ {} ] ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.keep-origin.http.html": [ [ "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.keep-origin.http.html", @@ -406467,6 +418058,366 @@ {} ] ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html": [ [ "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html", @@ -406539,6 +418490,366 @@ {} ] ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], "referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-http.keep-origin.http.html": [ [ "referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-http.keep-origin.http.html", @@ -406611,6 +418922,366 @@ {} ] ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html": [ [ "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html", @@ -406683,6 +419354,366 @@ {} ] ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/img-tag/cross-http.keep-origin.http.html": [ [ "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/img-tag/cross-http.keep-origin.http.html", @@ -406755,6 +419786,366 @@ {} ] ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html": [ [ "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html", @@ -406827,6 +420218,366 @@ {} ] ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], "referrer-policy/gen/srcdoc-inherit.meta/origin/img-tag/cross-http.keep-origin.http.html": [ [ "referrer-policy/gen/srcdoc-inherit.meta/origin/img-tag/cross-http.keep-origin.http.html", @@ -406899,6 +420650,336 @@ {} ] ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], "referrer-policy/gen/srcdoc-inherit.meta/same-origin/img-tag/cross-http.keep-origin.http.html": [ [ "referrer-policy/gen/srcdoc-inherit.meta/same-origin/img-tag/cross-http.keep-origin.http.html", @@ -406959,6 +421040,342 @@ {} ] ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html": [ [ "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html", @@ -407031,6 +421448,366 @@ {} ] ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/img-tag/cross-http.keep-origin.http.html": [ [ "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/img-tag/cross-http.keep-origin.http.html", @@ -407103,6 +421880,366 @@ {} ] ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/img-tag/cross-http.keep-origin.http.html": [ [ "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/img-tag/cross-http.keep-origin.http.html", @@ -407175,6 +422312,366 @@ {} ] ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], "referrer-policy/gen/srcdoc-inherit.meta/unset/img-tag/cross-http.keep-origin.http.html": [ [ "referrer-policy/gen/srcdoc-inherit.meta/unset/img-tag/cross-http.keep-origin.http.html", @@ -407247,6 +422744,366 @@ {} ] ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html": [ [ "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html", @@ -407319,6 +423176,366 @@ {} ] ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], "referrer-policy/gen/srcdoc.meta/no-referrer/img-tag/cross-http.keep-origin.http.html": [ [ "referrer-policy/gen/srcdoc.meta/no-referrer/img-tag/cross-http.keep-origin.http.html", @@ -407391,6 +423608,366 @@ {} ] ], + "referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/no-referrer/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html": [ [ "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html", @@ -407463,6 +424040,366 @@ {} ] ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], "referrer-policy/gen/srcdoc.meta/origin/img-tag/cross-http.keep-origin.http.html": [ [ "referrer-policy/gen/srcdoc.meta/origin/img-tag/cross-http.keep-origin.http.html", @@ -407535,6 +424472,336 @@ {} ] ], + "referrer-policy/gen/srcdoc.meta/origin/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/origin/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/origin/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], "referrer-policy/gen/srcdoc.meta/same-origin/img-tag/cross-http.keep-origin.http.html": [ [ "referrer-policy/gen/srcdoc.meta/same-origin/img-tag/cross-http.keep-origin.http.html", @@ -407595,6 +424862,342 @@ {} ] ], + "referrer-policy/gen/srcdoc.meta/same-origin/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/same-origin/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/same-origin/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html": [ [ "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html", @@ -407667,6 +425270,366 @@ {} ] ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], "referrer-policy/gen/srcdoc.meta/strict-origin/img-tag/cross-http.keep-origin.http.html": [ [ "referrer-policy/gen/srcdoc.meta/strict-origin/img-tag/cross-http.keep-origin.http.html", @@ -407739,6 +425702,366 @@ {} ] ], + "referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/strict-origin/xhr/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/a-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/a-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/a-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/a-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/a-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/a-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/a-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/a-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html", + {} + ] + ], "referrer-policy/gen/srcdoc.meta/unsafe-url/img-tag/cross-http.keep-origin.http.html": [ [ "referrer-policy/gen/srcdoc.meta/unsafe-url/img-tag/cross-http.keep-origin.http.html", @@ -407811,6 +426134,198 @@ {} ] ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/same-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/worker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/worker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/worker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/worker-module/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/cross-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/cross-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/cross-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/cross-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/cross-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/cross-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/cross-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/cross-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/cross-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/cross-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/cross-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/cross-https.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/same-http.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/same-http.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/same-http.swap-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/same-https.keep-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/same-https.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/same-https.no-redirect.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/same-https.no-redirect.http.html", + {} + ] + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/same-https.swap-origin.http.html": [ + [ + "referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/same-https.swap-origin.http.html", + {} + ] + ], "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html": [ [ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html", @@ -408135,6 +426650,18 @@ {} ] ], + "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html": [ [ "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html", @@ -408555,6 +427082,18 @@ {} ] ], + "referrer-policy/gen/top.http-rp/no-referrer/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/top.http-rp/no-referrer/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/top.http-rp/no-referrer/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/top.http-rp/no-referrer/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], "referrer-policy/gen/top.http-rp/no-referrer/worker-classic/same-http.keep-origin.http.html": [ [ "referrer-policy/gen/top.http-rp/no-referrer/worker-classic/same-http.keep-origin.http.html", @@ -408975,6 +427514,18 @@ {} ] ], + "referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], "referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ [ "referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html", @@ -409395,6 +427946,18 @@ {} ] ], + "referrer-policy/gen/top.http-rp/origin/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/top.http-rp/origin/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/top.http-rp/origin/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/top.http-rp/origin/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], "referrer-policy/gen/top.http-rp/origin/worker-classic/same-http.keep-origin.http.html": [ [ "referrer-policy/gen/top.http-rp/origin/worker-classic/same-http.keep-origin.http.html", @@ -409761,6 +428324,18 @@ {} ] ], + "referrer-policy/gen/top.http-rp/same-origin/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/top.http-rp/same-origin/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/top.http-rp/same-origin/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/top.http-rp/same-origin/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], "referrer-policy/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html": [ [ "referrer-policy/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html", @@ -410169,6 +428744,18 @@ {} ] ], + "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ [ "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html", @@ -410589,6 +429176,18 @@ {} ] ], + "referrer-policy/gen/top.http-rp/strict-origin/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/top.http-rp/strict-origin/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/top.http-rp/strict-origin/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/top.http-rp/strict-origin/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], "referrer-policy/gen/top.http-rp/strict-origin/worker-classic/same-http.keep-origin.http.html": [ [ "referrer-policy/gen/top.http-rp/strict-origin/worker-classic/same-http.keep-origin.http.html", @@ -411009,6 +429608,18 @@ {} ] ], + "referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], "referrer-policy/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html": [ [ "referrer-policy/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html", @@ -411429,6 +430040,18 @@ {} ] ], + "referrer-policy/gen/top.http-rp/unset/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/top.http-rp/unset/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/top.http-rp/unset/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/top.http-rp/unset/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], "referrer-policy/gen/top.http-rp/unset/worker-classic/same-http.keep-origin.http.html": [ [ "referrer-policy/gen/top.http-rp/unset/worker-classic/same-http.keep-origin.http.html", @@ -411849,6 +430472,18 @@ {} ] ], + "referrer-policy/gen/top.meta/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/top.meta/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/top.meta/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/top.meta/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], "referrer-policy/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html": [ [ "referrer-policy/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html", @@ -412269,6 +430904,18 @@ {} ] ], + "referrer-policy/gen/top.meta/no-referrer/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/top.meta/no-referrer/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/top.meta/no-referrer/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/top.meta/no-referrer/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], "referrer-policy/gen/top.meta/no-referrer/worker-classic/same-http.keep-origin.http.html": [ [ "referrer-policy/gen/top.meta/no-referrer/worker-classic/same-http.keep-origin.http.html", @@ -412689,6 +431336,18 @@ {} ] ], + "referrer-policy/gen/top.meta/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/top.meta/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/top.meta/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/top.meta/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], "referrer-policy/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ [ "referrer-policy/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html", @@ -413109,6 +431768,18 @@ {} ] ], + "referrer-policy/gen/top.meta/origin/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/top.meta/origin/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/top.meta/origin/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/top.meta/origin/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], "referrer-policy/gen/top.meta/origin/worker-classic/same-http.keep-origin.http.html": [ [ "referrer-policy/gen/top.meta/origin/worker-classic/same-http.keep-origin.http.html", @@ -413475,6 +432146,18 @@ {} ] ], + "referrer-policy/gen/top.meta/same-origin/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/top.meta/same-origin/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/top.meta/same-origin/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/top.meta/same-origin/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], "referrer-policy/gen/top.meta/same-origin/worker-classic/same-http.keep-origin.http.html": [ [ "referrer-policy/gen/top.meta/same-origin/worker-classic/same-http.keep-origin.http.html", @@ -413883,6 +432566,18 @@ {} ] ], + "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ [ "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html", @@ -414303,6 +432998,18 @@ {} ] ], + "referrer-policy/gen/top.meta/strict-origin/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/top.meta/strict-origin/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/top.meta/strict-origin/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/top.meta/strict-origin/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], "referrer-policy/gen/top.meta/strict-origin/worker-classic/same-http.keep-origin.http.html": [ [ "referrer-policy/gen/top.meta/strict-origin/worker-classic/same-http.keep-origin.http.html", @@ -414723,6 +433430,18 @@ {} ] ], + "referrer-policy/gen/top.meta/unsafe-url/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/top.meta/unsafe-url/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/top.meta/unsafe-url/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/top.meta/unsafe-url/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], "referrer-policy/gen/top.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html": [ [ "referrer-policy/gen/top.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html", @@ -415143,6 +433862,18 @@ {} ] ], + "referrer-policy/gen/top.meta/unset/sharedworker-module/same-http.keep-origin.http.html": [ + [ + "referrer-policy/gen/top.meta/unset/sharedworker-module/same-http.keep-origin.http.html", + {} + ] + ], + "referrer-policy/gen/top.meta/unset/sharedworker-module/same-http.no-redirect.http.html": [ + [ + "referrer-policy/gen/top.meta/unset/sharedworker-module/same-http.no-redirect.http.html", + {} + ] + ], "referrer-policy/gen/top.meta/unset/worker-classic/same-http.keep-origin.http.html": [ [ "referrer-policy/gen/top.meta/unset/worker-classic/same-http.keep-origin.http.html", @@ -428945,6 +447676,54 @@ {} ] ], + "svg/animations/seeking-events-1.html": [ + [ + "svg/animations/seeking-events-1.html", + {} + ] + ], + "svg/animations/seeking-events-2.html": [ + [ + "svg/animations/seeking-events-2.html", + {} + ] + ], + "svg/animations/seeking-events-3.html": [ + [ + "svg/animations/seeking-events-3.html", + {} + ] + ], + "svg/animations/seeking-events-4.html": [ + [ + "svg/animations/seeking-events-4.html", + {} + ] + ], + "svg/animations/seeking-events-5.html": [ + [ + "svg/animations/seeking-events-5.html", + {} + ] + ], + "svg/animations/seeking-events-6.html": [ + [ + "svg/animations/seeking-events-6.html", + {} + ] + ], + "svg/animations/seeking-events-7.html": [ + [ + "svg/animations/seeking-events-7.html", + {} + ] + ], + "svg/animations/seeking-events-8.html": [ + [ + "svg/animations/seeking-events-8.html", + {} + ] + ], "svg/animations/seeking-to-large-time.html": [ [ "svg/animations/seeking-to-large-time.html", @@ -430853,12 +449632,6 @@ {} ] ], - "trusted-types/TrustedTypePolicy-CSP.tentative.html": [ - [ - "trusted-types/TrustedTypePolicy-CSP.tentative.html", - {} - ] - ], "trusted-types/TrustedTypePolicy-createXXX.tentative.html": [ [ "trusted-types/TrustedTypePolicy-createXXX.tentative.html", @@ -435932,6 +454705,24 @@ {} ] ], + "video-raf/video-request-animation-frame-parallel.html": [ + [ + "video-raf/video-request-animation-frame-parallel.html", + {} + ] + ], + "video-raf/video-request-animation-frame-repeating.html": [ + [ + "video-raf/video-request-animation-frame-repeating.html", + {} + ] + ], + "video-raf/video-request-animation-frame.html": [ + [ + "video-raf/video-request-animation-frame.html", + {} + ] + ], "visual-viewport/viewport-no-resize-event-on-overflow-recalc.html": [ [ "visual-viewport/viewport-no-resize-event-on-overflow-recalc.html", @@ -440742,6 +459533,24 @@ {} ] ], + "webaudio/the-audio-api/the-audioworklet-interface/process-getter.https.html": [ + [ + "webaudio/the-audio-api/the-audioworklet-interface/process-getter.https.html", + {} + ] + ], + "webaudio/the-audio-api/the-audioworklet-interface/process-parameters.https.html": [ + [ + "webaudio/the-audio-api/the-audioworklet-interface/process-parameters.https.html", + {} + ] + ], + "webaudio/the-audio-api/the-audioworklet-interface/processor-construction-port.https.html": [ + [ + "webaudio/the-audio-api/the-audioworklet-interface/processor-construction-port.https.html", + {} + ] + ], "webaudio/the-audio-api/the-audioworklet-interface/simple-input-output.https.html": [ [ "webaudio/the-audio-api/the-audioworklet-interface/simple-input-output.https.html", @@ -485894,7 +504703,7 @@ "support" ], "common/arrays.js": [ - "49431dd78adf85b88682fe7dc5f139f16696f0bb", + "2b31bb4179c26d790174214be097160cc302d07c", "support" ], "common/blank.html": [ @@ -485918,7 +504727,7 @@ "support" ], "common/get-host-info.sub.js": [ - "1fbf2dbc68791f3188b0b82c71198bc409fb007d", + "1c28a7f476f67d513e4627b6133d0c2e0ffc867a", "support" ], "common/get-host-info.sub.js.headers": [ @@ -485926,7 +504735,7 @@ "support" ], "common/media.js": [ - "7cea1ac9b3cace356cbf661dd45e1c9dc156917f", + "e9b1e6b0fbe6ae9a45b8bfc4d920841bb74813c3", "support" ], "common/media.js.headers": [ @@ -485934,7 +504743,7 @@ "support" ], "common/object-association.js": [ - "d58f94b62d652ad2879eb83821ba278b56006f7b", + "458aae67db0cef0ce8306b6c2b56297b344ee615", "support" ], "common/object-association.js.headers": [ @@ -485958,7 +504767,7 @@ "support" ], "common/reftest-wait.js": [ - "87816f8345225dee5320a02f97954455713e3c78", + "0a30a197f07f4dfde98fa3a9460d39a3f5d770ae", "support" ], "common/reftest-wait.js.headers": [ @@ -485970,7 +504779,7 @@ "support" ], "common/security-features/resources/common.sub.js": [ - "cdd20a9d8daecefec26c1fe3ef5d7f2a4ed48008", + "ed7c32b8ce1d65c1e22f919e6a2fbcc80beec31c", "support" ], "common/security-features/resources/common.sub.js.headers": [ @@ -486122,7 +504931,7 @@ "support" ], "common/stringifiers.js": [ - "63544f9ed00f1edfd459ee7c8e9ee77aff7e0110", + "4ef7a1bfedaba1835bb44cca9207e0748ba83522", "support" ], "common/stringifiers.js.headers": [ @@ -486130,11 +504939,11 @@ "support" ], "common/subset-tests-by-key.js": [ - "d87ea9f76ee25f77982172aaa04d56fc000d7148", + "483017a644886a935c17a30b060462828a5efcdc", "support" ], "common/subset-tests.js": [ - "3713819c887726b375d51950255f7f7842bf61f1", + "58e93413de4090792f09e02010ef81c4a627d6bf", "support" ], "common/test-setting-immutable-prototype.js": [ @@ -486150,7 +504959,7 @@ "support" ], "common/utils.js": [ - "bcdc256d917406c6b1504b96c3e7087604fcd75a", + "62e742bee7f67cf3bd92a217a0a92b23fddf3017", "support" ], "common/utils.js.headers": [ @@ -486158,7 +504967,7 @@ "support" ], "common/worklet-reftest.js": [ - "d92c76cabf3c4a5bd5fa56306382e09a6d13b43f", + "e05d4ee801b53be521e589e37704f3bd9ef001f6", "support" ], "common/worklet-reftest.js.headers": [ @@ -505521,6 +524330,10 @@ "6f4b37ef8366974b5c64f558577fe60b72a6713b", "support" ], + "content-security-policy/reporting/report-clips-sample.html": [ + "cb69c930fc1121acecc85a7f9f0446bc60129b66", + "testharness" + ], "content-security-policy/reporting/report-cross-origin-no-cookies.sub.html": [ "a034bdbd4fe6c3ceb87fafb0816a6648da2f4e6d", "testharness" @@ -506654,7 +525467,7 @@ "support" ], "content-security-policy/support/testharness-helper.js": [ - "c071a68931562dae4b9862c71f35418efcc69b65", + "0e68c7267a4ba41948c830b008b0fe14704acfe9", "support" ], "content-security-policy/support/var-a.js": [ @@ -569458,7 +588271,7 @@ "support" ], "css/compositing/mix-blend-mode/reference/mix-blend-mode-parent-element-overflow-scroll-blended-position-fixed-ref.html": [ - "f88bfde0c5cdc61d51a892bc87f4d59d31601a4c", + "fd780ee3ccb4560864308c38e7c410aa54e064b9", "support" ], "css/compositing/mix-blend-mode/reference/mix-blend-mode-parent-element-overflow-scroll-ref.html": [ @@ -569622,13 +588435,17 @@ "reftest" ], "css/compositing/svg/mix-blend-mode-in-svg-image.html": [ - "658e0275d70b357b210ae70243a2f58b9752910c", + "ed0520e443fd10ca6ad25c91dd2752954fbbf9b0", "reftest" ], "css/compositing/svg/mix-blend-mode-svg-rectangle.html": [ "e74181e2c35bd0ba1b78eadb84640d321dfa6577", "reftest" ], + "css/compositing/svg/reference/mix-blend-mode-in-svg-image-ref.html": [ + "9a2a030737438cd3fb64e364e43a4fc364be653c", + "support" + ], "css/compositing/svg/reference/mix-blend-mode-svg-rectangle-ref.html": [ "6d74ee05211bedabbd0957d431dce86f27f14f33", "support" @@ -570250,7 +589067,7 @@ "testharness" ], "css/css-animations/Document-getAnimations.tentative.html": [ - "ba8c6d9194e879ef0f221aa20d4e9d95d8433f5d", + "4a9768a8b610e5327cc3497a1ec6f301642468a7", "testharness" ], "css/css-animations/Element-getAnimations-dynamic-changes.tentative.html": [ @@ -570258,7 +589075,7 @@ "testharness" ], "css/css-animations/Element-getAnimations.tentative.html": [ - "5419e11e653f36d2efdc376c3b698ce6b8080932", + "284b2493403ede6bc0b247aa9786fe77d9b7278b", "testharness" ], "css/css-animations/KeyframeEffect-getKeyframes.tentative.html": [ @@ -595249,6 +614066,10 @@ "1003bfb7c21401063b8460904281299f3ccab7c2", "support" ], + "css/css-images/image-set/image-set-parsing.html": [ + "bf17b2a866201d1e87c4bf978619ff4d87e4a600", + "testharness" + ], "css/css-images/infinite-radial-gradient-crash-ref.html": [ "a80236dcf75c22ecd8e43935d004f1fddf0550cb", "support" @@ -603005,6 +621826,14 @@ "5211506d8a17ce278407d2337d760b16f3fd34be", "reftest" ], + "css/css-pseudo/marker-content-021-ref.html": [ + "93c0540ca417be4ffffb0d09125559824f6c6016", + "support" + ], + "css/css-pseudo/marker-content-021.html": [ + "fc3fe851e9713add5fd6eaa8fc4b50da107f60dc", + "reftest" + ], "css/css-pseudo/marker-default-styles.html": [ "05da6f89a9e2f858eadfdfb63e5194feda5ce3fc", "testharness" @@ -606293,6 +625122,10 @@ "d2617f8aa2d1c966e394abb1d1617c012ea4648e", "testharness" ], + "css/css-sizing/ortho-writing-mode-001.html": [ + "9342802645faa7b57a12ce4b8ef17d755fcaface", + "reftest" + ], "css/css-sizing/orthogonal-writing-mode-float-in-inline.html": [ "fa95069dbf0083b0dc7095d2bb3acf20a6ccf898", "reftest" @@ -649257,6 +668090,18 @@ "52a2bf97124f0e6f3ff05fcc693c751f1cd0fca0", "support" ], + "document-policy/font-display/font-display-document-policy-01.tentative-ref.html": [ + "78bca05b124963796fa3ad9a291e7723f9f33df6", + "support" + ], + "document-policy/font-display/font-display-document-policy-01.tentative.html": [ + "cad4c18015cc7328b3970bdfe366ea473189e686", + "reftest" + ], + "document-policy/font-display/font-display-document-policy-01.tentative.html.headers": [ + "e1387f50deead65859267b376367a5eb2a92482d", + "support" + ], "document-policy/required-policy/document-policy.html": [ "1935be3dd0a961add3d80aa35ded92734d9f8869", "testharness" @@ -649638,7 +668483,7 @@ "testharness" ], "dom/events/webkit-animation-iteration-event.html": [ - "e6e7ec1459036870424300541612cdf48bb7f8dd", + "fb251972a32e1619c18a083ffc76dcd8284fd126", "testharness" ], "dom/events/webkit-animation-start-event.html": [ @@ -651049,8 +669894,28 @@ "cecdf98b08abf9ebc85b0183a13779a3b06776da", "support" ], + "domparsing/DOMParser-parseFromString-encoding.html": [ + "ab1e969530d6f056c2f7b2ea374c438f8d0a5635", + "testharness" + ], "domparsing/DOMParser-parseFromString-html.html": [ - "5e1dd1291decf4d76ad17a976520c4311eb08e7f", + "86e516d6180acb4bd614e91067df625765d28352", + "testharness" + ], + "domparsing/DOMParser-parseFromString-url-base-pushstate.html": [ + "41d7344a64de17a48d3cd5e26c309ef4eb1d260b", + "testharness" + ], + "domparsing/DOMParser-parseFromString-url-base.html": [ + "5af1cee1c570f7ac32e3f5b8f5d26b7bbf5a569e", + "testharness" + ], + "domparsing/DOMParser-parseFromString-url-pushstate.html": [ + "ecb89bc7412817102980daf4fb1f953223ca68b2", + "testharness" + ], + "domparsing/DOMParser-parseFromString-url.html": [ + "9b9a672c48be7306a91a32516ca51900adb7ba95", "testharness" ], "domparsing/DOMParser-parseFromString-xml-doctype.html": [ @@ -651062,11 +669927,11 @@ "testharness" ], "domparsing/DOMParser-parseFromString-xml-parsererror.html": [ - "9ecd0edd1e7d3244940c2d9b0dc3f7b4bcf478a4", + "f6985aa20a3eb76c2c0ae9f65a0bed3cdbb4672d", "testharness" ], "domparsing/DOMParser-parseFromString-xml.html": [ - "c639c239dd432cfe029dc0414601ac921cca8892", + "b07bb3d87c823bd7cc4c1bcc751eaca3a18b53cb", "testharness" ], "domparsing/META.yml": [ @@ -651137,6 +670002,30 @@ "1ce5df03e4be558abb137847092e31fa884096f8", "testharness" ], + "domparsing/resources/domparser-iframe-base-pushstate.html": [ + "9c4a1bd07ac91d2067b7aafa736d6895a4f45bda", + "support" + ], + "domparsing/resources/domparser-iframe-base.html": [ + "e8a084b7dce26320515dd13d273ee7857ca84c31", + "support" + ], + "domparsing/resources/domparser-iframe-pushstate.html": [ + "b2821c69940f4b30d78e1c358fa8f84d66dea6ca", + "support" + ], + "domparsing/resources/domparser-iframe.html": [ + "710f141bb9e0d5ede986c36935aa8dfa93d0c895", + "support" + ], + "domparsing/resources/domparser-iframe.js": [ + "a62d2f293b306f2ee47bef8a92e7d73e26089b54", + "support" + ], + "domparsing/resources/domparser-url-tests.js": [ + "7b02fab1c30bd46ecd3e278b1925186495d40249", + "support" + ], "domparsing/style_attribute_html.html": [ "f7f057d2d862497ca4030c76ed1a3ab9c5df5d9f", "testharness" @@ -675293,12 +694182,44 @@ "19be9e1d03ca304f715f754350af642819587eda", "testharness" ], + "html/semantics/scripting-1/the-script-element/execution-timing/106-defer-import.html": [ + "451e218ef74a78260069c2887b57657f4e9bc948", + "testharness" + ], + "html/semantics/scripting-1/the-script-element/execution-timing/106-defer-noimport.html": [ + "704b880bcfb2c09b76c74b6f540f3de5aa75b4fc", + "testharness" + ], + "html/semantics/scripting-1/the-script-element/execution-timing/106-external-import.html": [ + "4fe526a2744ddaba237863a008315664028e975b", + "testharness" + ], + "html/semantics/scripting-1/the-script-element/execution-timing/106-external-module-import.html": [ + "ea873746e0ccd1ce296f309f36bb9aa98196cdfa", + "testharness" + ], + "html/semantics/scripting-1/the-script-element/execution-timing/106-external-module-noimport.html": [ + "71c59fb4d6034cfa43e91832a83387410109808c", + "testharness" + ], + "html/semantics/scripting-1/the-script-element/execution-timing/106-external-noimport.html": [ + "3694481b86a6b28ab3ab97eb894b38978533c08b", + "testharness" + ], "html/semantics/scripting-1/the-script-element/execution-timing/106-import.html": [ - "db7abcc88de16ea347b663d98da4f3f4acb27c81", + "b8afeda1357953fb05ab7f7d0de51b26e4f6b676", + "testharness" + ], + "html/semantics/scripting-1/the-script-element/execution-timing/106-module-import.html": [ + "d3f02ffd19cdc11f5ad5fca3fe149392bfbf8cda", + "testharness" + ], + "html/semantics/scripting-1/the-script-element/execution-timing/106-module-noimport.html": [ + "83cd29f26742c77b20b01c7bee42b0d974bf7b7b", "testharness" ], "html/semantics/scripting-1/the-script-element/execution-timing/106-noimport.html": [ - "8e099c58023f2c9c12e74801e8534a64692360b4", + "bd8ec8633e4878d36a45752c482fba40a91e713e", "testharness" ], "html/semantics/scripting-1/the-script-element/execution-timing/107-import.html": [ @@ -675493,6 +694414,10 @@ "271bc8f569e51799ffdac9f36cc4eb6e8c9f2fd2", "support" ], + "html/semantics/scripting-1/the-script-element/execution-timing/scripts/check-style-sheet.js": [ + "cbab154f5ae794ca2baccfa37ff4621cb87a4796", + "support" + ], "html/semantics/scripting-1/the-script-element/execution-timing/scripts/count-script-tags.js": [ "8fba4ecb3c0c4fbf6190305e56e0cd633de0ec42", "support" @@ -680866,7 +699791,7 @@ "support" ], "interfaces/IndexedDB.idl": [ - "a66a245466ecb166836df87b50424a5f5c23de35", + "8af2bbcf23821e34f95fe2cabdb3d3b3b91b3eb8", "support" ], "interfaces/InputDeviceCapabilities.idl": [ @@ -680886,11 +699811,11 @@ "support" ], "interfaces/SVG.idl": [ - "63367fdc23e1d9836be45cea103463a43304d75c", + "16a9b7e295d1bf4d9687c0bde7a0d632d8fca81b", "support" ], "interfaces/WebCryptoAPI.idl": [ - "fecb3b72d3afea791a0f0648bcefa6dc014fe330", + "d81a43ba0f92388ffd89f0808e32313c7ea58e56", "support" ], "interfaces/WebIDL.idl": [ @@ -681078,7 +700003,7 @@ "support" ], "interfaces/geolocation-sensor.idl": [ - "0083cdac19828f31de79d140d50e60d330417661", + "ef172f63ea0eb141cb20551da76e578cbff733d0", "support" ], "interfaces/geometry.idl": [ @@ -681110,7 +700035,7 @@ "support" ], "interfaces/intersection-observer.idl": [ - "ffda8f5c64dba8d225cc7126371b73980f4ce48e", + "133622e508c7f2f223e5584b33e47af219282d8b", "support" ], "interfaces/keyboard-lock.idl": [ @@ -682206,7 +701131,7 @@ "testharness" ], "lint.whitelist": [ - "e428d2f4f1911d93cfdfde2f1a924b08d32e8ea8", + "48206424a56ac4d7e9c61a8f606c81fc6b0a1b60", "support" ], "loading/lazyload/META.yml": [ @@ -695078,7 +714003,7 @@ "testharness" ], "paint-timing/first-image-child.html": [ - "9851800a7bd75d7a6791557784407445ad3a35ea", + "3f073144692ea6732951aff7839b9cf8baf01e14", "testharness" ], "paint-timing/first-paint-bg-color.html": [ @@ -706029,6 +724954,5102 @@ "4ff9a5189029c5646d87d6693a507ee9445272a9", "testharness" ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html": [ + "f40329c212fb0d73dfc211626ad3cb339fae951d", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html": [ + "9e6afa8634a03300ce8a3725e7a1c76575d5c5e2", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html": [ + "e9637854a6bc100e8c15d465a8b309a3467c800b", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html": [ + "68ee1feb25c361b68c0adab9404201b2f100bb73", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html": [ + "8c04f7860d4bdefa864ceaf7758f677eb4ac6bca", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html": [ + "87f99d26dd4d62b35178cd168c3e089ff8680fa3", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html": [ + "8cdc8dede5bd105057c5cfe304e8072ffab3ddd0", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html": [ + "f7ae7c74ce1cc19f2da0cbb1d162749e2468cb52", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html": [ + "becd45f8783e0f979bc1686b00fe32d08970498c", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html": [ + "27fc28d29ef542a30a2d817ecbc50a366dd085a0", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html": [ + "3bf9a5cfb60dbb0160e841f23755e3d5f5da2ae9", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html": [ + "c73c02f11c1166e8366079fd8bb2ecf41886893e", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html": [ + "54964c2e86662988e972eb623558bf6e68b2e27a", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html": [ + "e62a07937dc3d32060c4c7c5419c7ae952ff864e", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html": [ + "078ef7e94616e5f9c660a89ad1401847f0b97dff", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html": [ + "688138da608c8ce8277d8b4fd5a4ab3e1ae5871d", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html": [ + "db4f954cb9f2a8852976a8dc7126c254d0f47a53", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html": [ + "b580ed7ba4b3a734fae23bb9b0012cabb61710bf", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html": [ + "54f1fca5c03f15b8502cc98afea2dc153959992e", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html": [ + "7833ada811ccda94d483c0147cc89c9ced6da1f1", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html": [ + "eea865cbf9abe47d41ae635a472dc7e8d26f5584", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html": [ + "a13ab77a484578683d2ef3d1d9980b4c2a30fb9c", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html": [ + "d0361907f572b032b904f6eee7f9d304f3c5ae91", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html": [ + "c587938c982ddbe4e6851d995150384c0fe06663", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html": [ + "065a3256d96080bb64b8cb6bb2901892b6da69c4", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html": [ + "50df500303bc7ad75f8dd3355fb8b2621d1f2820", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html": [ + "f8480873f92da35207089a0783137edd5c438c4b", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html": [ + "e8d912287edafc0d795dd3b305a1170a9b187a47", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html": [ + "44ab616793121f94f9e00a8a2e4e262f501b9521", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html": [ + "d8171e5828983f848828a8b7460fa7062c113a78", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html": [ + "d84a62264b78bd957e1fe6baae4768efcb9ff0db", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html": [ + "94c2d3fff86ddb6f0d09e331132da809983840f8", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html": [ + "05a4d5b223232df7a09ec8744392a9d779f86e10", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html": [ + "e7643dc046d22fe700d3c46a9510ffd1772e37da", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html": [ + "2b41189828255e358a0dfa479af4b225d6ddd2e8", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html": [ + "85b251417cf5b1427ef58836b4b609864efa3e6e", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html": [ + "fbddb8cf84d438545418b5c34432d744bca6d042", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html": [ + "c5e0ef034fea045936cd5e1cf6576a3e40b5194e", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html": [ + "60131a195ac6479681b106fffae801079fb7f08f", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html": [ + "46900881c32da4232f953075fc8aa311d9677d1e", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html": [ + "b363223c47ebd4e10e3e28efa5bc56cd17dd00f8", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html": [ + "d70a2568f9d0042f0d34e419613712ed75e70a01", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html": [ + "bfa84ecdc1971635fd4cb88863dfe4747320f3b6", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html": [ + "05a16fb65c355a05e6bc80b35605e16bc655f874", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html": [ + "214024aae28271efc44597996252f829fe111915", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html": [ + "d086e1d15c592a816670291b6f461600d6a4ab26", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html": [ + "1d942b99360eea0a039c89f3e44168cd453e46f5", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html": [ + "b76e0f06660a6922983ec234e8734cfe07cdfc84", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html": [ + "e684c67316b29643946248da9f5ce99061dd2a23", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html": [ + "b829800781dc66fcc1d436324cc230a55654851a", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html": [ + "bc683a4b60f2f3dfb18fe68af33fa893ce97e8b3", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html": [ + "516155748ae8fa9836d4c6141f3e0d99c8921cb1", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html": [ + "fd681e7ba1e23ba8f7beb9ec92e0c7c382dd107c", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html": [ + "92911e7d885ac92d7728d1db9473abc0c0e3ea5f", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html": [ + "d0bf7f66f663c5a5331db89957975704db9dd4b9", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html": [ + "e34d1a3677e2468009a77b162bf8c7d7506d286e", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html": [ + "3dd7d39ca05ea7cdf0ec89efb782034ee1b48b97", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html": [ + "a7de37ef77db893f2b92110ae4fe16c8efdec17c", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html": [ + "e3813d88e601874820c5a7ca2acc5c18b75ed0b3", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html": [ + "54d040301a713783bfc1b14a157a35fc24dff750", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html": [ + "5428aaff1f28bd674bac1dcf91460700f14bd65e", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html": [ + "a1c952d3727c09ed3b4afdbd058d4e4287a1e722", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html": [ + "d1017f2ce589eb626c10778401219a3946d41848", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html": [ + "abbbd0c8ea5550e6d96b15f42a3fb62ae524c2d4", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html": [ + "857ae5dc1d597ac5cce52903294862fa3800b1b8", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html": [ + "9de68512ed9a3a8e7e98c3d6465882a3ed70632c", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html": [ + "2a4bb3bf9a86cac3dc029b598ab5dd7b743a41bf", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html": [ + "b7cddf0a2d50258a877ec01ddd17e61b6fde4951", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html": [ + "1dc4dbb2fb2962d2d05321ffd3b44ef416a00bce", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html": [ + "7d819ea89df5a72ec7843b7b85b475136b66d158", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html": [ + "a661c0b47f6336926bc209d6a6b534d995aefb35", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html": [ + "7fa375ba26128bfed03d1ab1cb3b5eee5d2bb30b", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/a-tag/cross-http.no-redirect.http.html": [ + "99b4c39e72440404cf1dac010eb2bcb5bf6774db", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/a-tag/cross-https.no-redirect.http.html": [ + "bcacae0fc1d01f0b61c489ef916fae541bc73876", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/a-tag/same-http.no-redirect.http.html": [ + "dac69c16680e515361467ebd73c0b05d264ff7db", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/a-tag/same-https.no-redirect.http.html": [ + "8d0ee75e759155552904338027d6fe65d1f96fa8", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/fetch/cross-http.keep-origin.http.html": [ + "b3c24b4878f0ca4ae09cd8258389c0e33be73548", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/fetch/cross-http.no-redirect.http.html": [ + "67407fe3dbedf6855564af5382ac6035a44ff200", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/fetch/cross-http.swap-origin.http.html": [ + "710ab16c8387b1343058a1c058c25e3986b85028", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/fetch/cross-https.keep-origin.http.html": [ + "e860035e5395b0aaa666186415f422f3963edb83", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/fetch/cross-https.no-redirect.http.html": [ + "6ea585ca7e0d5c4c648fb46be9493ebb280b7c70", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/fetch/cross-https.swap-origin.http.html": [ + "646e22376dcf672e83b04bbb22c28c80a7692eb9", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/fetch/same-http.keep-origin.http.html": [ + "a5a1058f4438cc3c731267e5347aaf7da6d0235f", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/fetch/same-http.no-redirect.http.html": [ + "ea1902955fcaa91ff728df63db1777d73c3e6528", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/fetch/same-http.swap-origin.http.html": [ + "101fe0a2a3d60b1727f0aa178e3f134c87e04712", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/fetch/same-https.keep-origin.http.html": [ + "1ae5656db279f7c9ce6c9fb71df8c79a6068ac24", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/fetch/same-https.no-redirect.http.html": [ + "26e10947f5524cfa6fcfd736cc545902c1481912", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/fetch/same-https.swap-origin.http.html": [ + "756771b91e6870dcd681d1807e667d006c9c1cdc", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/cross-http.keep-origin.http.html": [ + "3696798c10e122cb7791bf643cd1f208ad475ee0", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/cross-http.no-redirect.http.html": [ + "752103e4824932c3464d6b3b383321f75a029f41", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/cross-http.swap-origin.http.html": [ + "246d4569b67df6450a4992bf1a41d3f1981e29c9", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/cross-https.keep-origin.http.html": [ + "daae0be23bf338d73b5ba20b929896a1545d29a7", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/cross-https.no-redirect.http.html": [ + "be86876c477ec6b10fbbe7aa1ac65853deffdc7c", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/cross-https.swap-origin.http.html": [ + "eac91f8ac9ba1908ffea63ead99948407ad81ab2", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/same-http.keep-origin.http.html": [ + "5c6cc8af9e4fd625dbb2f1517fcef9605358ee1d", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/same-http.no-redirect.http.html": [ + "3e201353cfa513072661bb6d77fbf988a3aaae1f", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/same-http.swap-origin.http.html": [ + "6afffde9a415d92bbccf6d6dd91f39ecf9b76bdc", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/same-https.keep-origin.http.html": [ + "e58c9c86c39acdd53584f957f8896935e8417448", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/same-https.no-redirect.http.html": [ + "c683c640dced9f3fb59e519d6134c7df4746705a", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/same-https.swap-origin.http.html": [ + "00e3faba9451faf73c2810236e57df1df498bee2", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/cross-http.keep-origin.http.html": [ + "643dbf57cea45aa30a42c118c4978d772992f822", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/cross-http.no-redirect.http.html": [ + "1ce5b246fda74813a10d8e2594771a3897f47f6d", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/cross-http.swap-origin.http.html": [ + "60391750948c728a2f02bb50c04b778109e205cd", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/cross-https.keep-origin.http.html": [ + "f0664a9cab3d2879efb58394d0eb8172f527beba", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/cross-https.no-redirect.http.html": [ + "a15835606be54e9aac37f18af33dcf813eccbf2f", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/cross-https.swap-origin.http.html": [ + "0ac09cc4e6ee4905570d2538c5ad19a5fd003c5e", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/same-http.keep-origin.http.html": [ + "fff0b892e17ed2a711d7af86a082f58b414fd45e", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/same-http.no-redirect.http.html": [ + "559fad08dffda4a63a4165450ab6c763970e8299", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/same-http.swap-origin.http.html": [ + "1ebfd329ea51fc517c6653932d8f76ca2492d5a2", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/same-https.keep-origin.http.html": [ + "2de09dfbd4039e4d18d9cfd9c82566a58245629a", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/same-https.no-redirect.http.html": [ + "185dd63cdcd5e7cef9b893d1c80afbcbfd45d083", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/same-https.swap-origin.http.html": [ + "1d4c618e1d8ab79c87a6c7f214c858ee8e262be5", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/cross-http.keep-origin.http.html": [ + "76daa7498ea370119194bc7885051218820ebf55", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/cross-http.no-redirect.http.html": [ + "c0affda94246ad0c35e00bd66caade67b92b01f6", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/cross-http.swap-origin.http.html": [ + "32d80938cbc33b01f34672016a6d011926cfa11e", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/cross-https.keep-origin.http.html": [ + "d96108c1f47ee78a792715f74bbd522741464f2b", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/cross-https.no-redirect.http.html": [ + "c8c3eb3be544b93cfbe27831273fe290eaccef51", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/cross-https.swap-origin.http.html": [ + "1ac02babc4abd524652c311fe6ef25be225f096e", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/same-http.keep-origin.http.html": [ + "f4ea5314d84a7d1f3b440ad1a7919c62f03fd4c6", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/same-http.no-redirect.http.html": [ + "11b4a93827b372bb39a4542b473785b19e1c58cc", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/same-http.swap-origin.http.html": [ + "4b7f1b37dd72724e75c608605dc02b335d255fc6", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/same-https.keep-origin.http.html": [ + "408019d52b51784c691865ae4e8e07049b0b1be6", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/same-https.no-redirect.http.html": [ + "82d126fbf67926d66df71596d0bbf23ba5a73385", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/same-https.swap-origin.http.html": [ + "a76d7027ef29cf5660e585a32e80bdf6750af156", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/sharedworker-classic/same-http.keep-origin.http.html": [ + "7e35b3b7a7703213bf7dfa716597f869de3f52f6", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/sharedworker-classic/same-http.no-redirect.http.html": [ + "5bf4bfa2bb4deb10dee28a38a4ca8e1521de694d", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/sharedworker-module/same-http.keep-origin.http.html": [ + "a711ad1635b04e7efd28b24d3ecda4bf3ee061de", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/sharedworker-module/same-http.no-redirect.http.html": [ + "cbeb7fa034516bd276c051c00f39eab7a0324bc1", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/worker-classic/same-http.keep-origin.http.html": [ + "56b03263d446bcd4daca1c65326ee1eb9be26b7a", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/worker-classic/same-http.no-redirect.http.html": [ + "a90cce3bc4d9590e89c9117f5ba91aba722a4f58", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/worker-module/same-http.keep-origin.http.html": [ + "2d932986b51285ddef646ab0b2b25e205e371016", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/worker-module/same-http.no-redirect.http.html": [ + "97a5be59966a6cc34ac4d1309d86125185e722d6", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/xhr/cross-http.keep-origin.http.html": [ + "4925b13ad02af70c367e711ace567846ec485782", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/xhr/cross-http.no-redirect.http.html": [ + "4c90c3a92af5a06a3659d1ea1152515513e3b530", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/xhr/cross-http.swap-origin.http.html": [ + "1bde08e912aeef6321dfc93dae9023c29b8e0f9b", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/xhr/cross-https.keep-origin.http.html": [ + "d11b2d32b5f7fd31ae61cdc12a197d9c321b8801", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/xhr/cross-https.no-redirect.http.html": [ + "fdac47c4c8c02352b7ba4bc27a1709876e860997", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/xhr/cross-https.swap-origin.http.html": [ + "179fa0e905fbcfd5c9838f19df56085ff10ad419", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/xhr/same-http.keep-origin.http.html": [ + "5aa09f0e770a211fceee33a844dafcfeb32c3147", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/xhr/same-http.no-redirect.http.html": [ + "41494f2b2a04fd4f6c6c6963d6c5f29d613212b7", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/xhr/same-http.swap-origin.http.html": [ + "ee1a86d2e72318cecf006d043e595a0aba4ba2a4", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/xhr/same-https.keep-origin.http.html": [ + "3c67f3fb0bff4dc1e6026f8eac592819ba0243f4", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/xhr/same-https.no-redirect.http.html": [ + "66b25c1a9473b83f5800bba06f1aca81bdff0ba0", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/no-referrer/xhr/same-https.swap-origin.http.html": [ + "2a99dfca6c462397aa7f3754701acb8a46887fbc", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html": [ + "4319759e6df2b9543f69a6713b757f8da15b0abf", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html": [ + "4550d19f645f941dbfa832f3b48869ad77b3bfe0", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html": [ + "8436020d904fdd8ed43b8c8ff78d86fa93b138d6", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/a-tag/same-https.no-redirect.http.html": [ + "b0f2963f50afa8797b5253a33b3edd4d252ccc1b", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html": [ + "3bbb5fd8515a695494cf9c855308ed7a18fd6ddf", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html": [ + "2d156f3cbd758477c74d921318fc5d1f4c556a30", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html": [ + "0f5c7adcec2e5a6348937672aea12e5963032c59", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html": [ + "9ab6a9cde13adc7c5adce61874320523dbb7283d", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html": [ + "5df2addb93517e045ac3522ed4fc097d802af4f7", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html": [ + "5af603ccec84c05995841caf15dd63f5b8b9781d", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [ + "43ea369cb09bab56485e6483e8a9d30c69a9d6e0", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [ + "9794580bf79c43ca80af8f32d1ad41c795344dee", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-http.swap-origin.http.html": [ + "5c1e0bd634b7bf6122396f41a0cc62988d650eff", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-https.keep-origin.http.html": [ + "a1d798e2c8cc44fe342e3c0d0c0fb996da004d1c", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-https.no-redirect.http.html": [ + "b52bf14464a670ad5e8032d127940e686ab8e9e5", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-https.swap-origin.http.html": [ + "5c716a9aa20222f1c3a8b85c074efc8642135ced", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html": [ + "c0669c45630117f45b2c71897bca4f75b07a0a94", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html": [ + "eeee12c2985d9d2a550aaad34c73b55bf9974e7a", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html": [ + "511e78a5b4b923cacd348ef3181643d1576edbe8", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html": [ + "907f209ef6c7e68443a72653f35edf17de9c48dc", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html": [ + "9bb1895fc50e648295deaa0e63b0d1bcfe6dec9c", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html": [ + "66b5d659af8a8ccb86d40bbb6ac1d4eb9130bf95", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [ + "a1afeef02bb4943a8ae30ea77d12136c69819981", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [ + "a4444a31561616c03e512917aef7bc0c0de1efd0", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html": [ + "cd22e3b187e7f5bd557c134b5a731e6458396884", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html": [ + "0ee2ccb108f5b65b4228d046468080f9199b0b4d", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html": [ + "93df080f4bf871be0253902ff1a39917c2173c6e", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html": [ + "b341f5897f902cd3bfa207bc2222aada4714defc", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html": [ + "c4f33177c91070ec3543f1764a4090f59dd1aaf6", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html": [ + "44aa807234ad667651042b5e1520af0663e8f8fd", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html": [ + "411308cb0a94728f5ba97a5a5f4fe51e302a845a", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html": [ + "09bd458272a2ef4225872074076cb37cf714258c", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html": [ + "280c4bcfa0a6aa846975cc440ad59a6970da20e6", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html": [ + "bc90c8444e2ab36a146a9de71986359829cd90b8", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html": [ + "5a52a15fc91828cd79a6db2ff1d5a5272e5502a8", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html": [ + "210cdfd992d58af5f57281791d3ad834eaa4f408", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html": [ + "ba8141fab8a8183c3413624ec9f573f56df44353", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html": [ + "79fa59f597b3d61faa16fee0668d970c97d6bb93", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html": [ + "cd8cd20e5ea1890a66a6803333d8e678217018f4", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html": [ + "6dfaaca65bb95d0cca4ab65fe38e6714fbd3c1b1", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html": [ + "76b9a77c7f3e0fc936cbf4df3c7f76f3abe50217", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html": [ + "4de878bc7edd3aab4c01ae6d2cd33e6b261189a7", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html": [ + "64b036464542a9ffd2b37299aa6474f03655f557", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html": [ + "55b5ae9af7e1a094e8c4973d8b78df6131e9a7d1", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html": [ + "8cac2079b57e1ce7392adce7f72354fc36f95120", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html": [ + "e729ba5359f2be97aaaa94ecfa9021095bc3cde9", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [ + "f39df32c5f13447eb03db6a0922ccfc6dd454d4c", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [ + "2431175637cae9a7f7f0ea405106b4e6a480e9ae", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html": [ + "e3f84f9b833beb5386dc4979496c030c083ebc43", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html": [ + "3952ec5ba0fdc56ad54f9ec3b68668f57e08c926", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html": [ + "b3d4c41e40a4928fcf8232601dc5c6ee0334d37e", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html": [ + "050eb2a225cfb7a782f0dc3a647ca1c983bd0cb8", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + "954ee8448cf8b41cb2f78b60d0ee0315ac435f64", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + "c39b578e23aa74c9485a20e5919da465037c09d8", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html": [ + "4386db152d03eb1b95e8fbb1c56205fe81e73941", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html": [ + "2f17ab969f173961896cb3059af30f39a35a40f2", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ + "ff527bf23149a58ae7f513a71991a7ecf4ccf25a", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [ + "332119c089a4306bce321405431703ce1bfd14df", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [ + "2ea2e5bab4338ec19a476c4864f99c7400963463", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [ + "d869c62805f6961c312a84054f9f370975dd6be7", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html": [ + "f5ac8234580626d54bad6fc3795286f693178787", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html": [ + "5089b306a503dca36f16fd5543e7383f03b0c1ab", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html": [ + "a1c275f8ae47911e1842069be323fc418c9bdf99", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html": [ + "e65b343b7d67e73833d7ac9a9e733e9e6a282880", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html": [ + "3ad030d1bc711b04d110363340d93f4f06a48fd3", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html": [ + "2a142435b55371c8018575b319b8749688ab422b", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [ + "d42e7521ccfd39d51d74980b940997284d8089c7", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [ + "3072a150b6f5b226538fca69a4506489c4e7084b", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/same-http.swap-origin.http.html": [ + "d86852da9d17f8fb82cb6394f9a7d8ad0f4164c3", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/same-https.keep-origin.http.html": [ + "52247283e4e63e3f90582bdfc16bb5c6e488fef9", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/same-https.no-redirect.http.html": [ + "4551ea307ac2851110557de3e790b1398b11e6f2", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/same-https.swap-origin.http.html": [ + "5919d219bd74b6d02feddbd1a1dd95c071cf22ee", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/a-tag/cross-http.no-redirect.http.html": [ + "bed59dce30c1d404944f3a7840d3b9a97f5d7224", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/a-tag/cross-https.no-redirect.http.html": [ + "4f1398884da065ebb7936e7c1c6f83ec5ffee1b6", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/a-tag/same-http.no-redirect.http.html": [ + "834e58d6d5d99f89398d40f5d2fd48772b745fd3", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/a-tag/same-https.no-redirect.http.html": [ + "21e9cda1211ec24992cf0e53df60c3bcdd26a350", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/fetch/cross-http.keep-origin.http.html": [ + "f89a3b86a1f2c7f2932885140ef6bbd44541a2a7", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/fetch/cross-http.no-redirect.http.html": [ + "296f5091fc571cd5daeb50147b1c0439c1898afc", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/fetch/cross-http.swap-origin.http.html": [ + "f0ba941c10cc8c2c213b02dbcd7d8409a02fee6c", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/fetch/cross-https.keep-origin.http.html": [ + "4b6750639405c3dd45a53fdda050896d57f25944", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/fetch/cross-https.no-redirect.http.html": [ + "dc2d9b287fc0c59370c4bea83f2ff31fa92ae959", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/fetch/cross-https.swap-origin.http.html": [ + "00dc6d788f3ddd0ae71322aa652862634d1063d0", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/fetch/same-http.keep-origin.http.html": [ + "e71ffd1db24db9b004ba533bc0933944a1a271ee", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/fetch/same-http.no-redirect.http.html": [ + "a43e48b7293912fc98f8c4f702f57e84c2673013", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/fetch/same-http.swap-origin.http.html": [ + "c8aa2c57260ce6ee84007eadfc787e93a3cb53e9", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/fetch/same-https.keep-origin.http.html": [ + "f2e5f3ea67ab200e2c01504f6e9bcb4e65f2dbc2", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/fetch/same-https.no-redirect.http.html": [ + "454fbdd9b768378ba10b1db2cbe3332983e938ff", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/fetch/same-https.swap-origin.http.html": [ + "50b9aaa414a98daa315a9f4f98e852db1f1e0919", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/iframe-tag/cross-http.keep-origin.http.html": [ + "0f15dafff52a5f3c90ebd2a0d9f100d465002d0d", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/iframe-tag/cross-http.no-redirect.http.html": [ + "85be8fd9a55cd8b8f45779ba1e40e50135435c37", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/iframe-tag/cross-http.swap-origin.http.html": [ + "52b8f6bec5677a16fdc7fa2c5333ddff7a9b26f9", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/iframe-tag/cross-https.keep-origin.http.html": [ + "f8123162374e59ef912710c904bfdb992791b3cd", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/iframe-tag/cross-https.no-redirect.http.html": [ + "332e76cbb564b097809da29107e6cd29dfa5e8f6", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/iframe-tag/cross-https.swap-origin.http.html": [ + "5180682085c6dbd9d2f51d3e61ccbc767501a47a", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/iframe-tag/same-http.keep-origin.http.html": [ + "e3d72ca77d9f9489da75e14baea49d7b0f249db1", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/iframe-tag/same-http.no-redirect.http.html": [ + "d40ce7cec92fa91c33dedb2e0eed0a99bf616989", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/iframe-tag/same-http.swap-origin.http.html": [ + "a621683979fb7a915e4caa9dcf814ced910edb1e", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/iframe-tag/same-https.keep-origin.http.html": [ + "0e0a0c31e9569bb401c64ea20a6e02ebc1d9efd6", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/iframe-tag/same-https.no-redirect.http.html": [ + "69ddf44bd596dab5a14813457760ffff83d6b9f1", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/iframe-tag/same-https.swap-origin.http.html": [ + "b645429c94bc67d1d3c11ea964410c991965356d", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-http.keep-origin.http.html": [ + "f65f670ea99c425c4de92f1bb55effc43097890d", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-http.no-redirect.http.html": [ + "54dec4261cf72a24d6a3f0162aea60bba7a36d7f", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-http.swap-origin.http.html": [ + "41c921541b7eea5f0ef6ac9f0ffcd92a87e4df15", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-https.keep-origin.http.html": [ + "04b1346a138493120e5cb7237a4675947da4582f", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-https.no-redirect.http.html": [ + "da584fd70bdd950b9b1c013861ed188e465a29a4", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-https.swap-origin.http.html": [ + "cd7053e342640f0466e97efcd9d668006e20240b", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/img-tag/same-http.keep-origin.http.html": [ + "73d941eec9dee957e69b9877a4fc9710881aa540", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/img-tag/same-http.no-redirect.http.html": [ + "b8d989041083afc04be2f15a5637bb6aa5a90857", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/img-tag/same-http.swap-origin.http.html": [ + "10a2852215994ebfecc70e450ccc4c6454df67c5", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/img-tag/same-https.keep-origin.http.html": [ + "ed25c875111f942d19e5d6ab8ad1e4ad8d7d1dd2", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/img-tag/same-https.no-redirect.http.html": [ + "fcd5bf094a9ab98f79a240d93e6a505cd8e00bba", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/img-tag/same-https.swap-origin.http.html": [ + "c8426ab5ed92931c01ba55f67c97cdabcc6439ca", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/script-tag/cross-http.keep-origin.http.html": [ + "46d481320d8bb60de28a68718d41a6e7ff930d66", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/script-tag/cross-http.no-redirect.http.html": [ + "c0ac69bb057dcc4b0aa24ea575e5a4eac0e567fe", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/script-tag/cross-http.swap-origin.http.html": [ + "f64acc6383820127f1669f76265a30ea26686e5b", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/script-tag/cross-https.keep-origin.http.html": [ + "23a55dff806e9dd939e5c18f20f90e946d2f0649", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/script-tag/cross-https.no-redirect.http.html": [ + "6cc1ad7e67793a52713c622afaa3efa4e6074153", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/script-tag/cross-https.swap-origin.http.html": [ + "eb3b107a7ee3c14473a133c932352443236dccef", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/script-tag/same-http.keep-origin.http.html": [ + "339072fcd748504f6e3a59116a2d521f9ccda9cb", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/script-tag/same-http.no-redirect.http.html": [ + "884469b3b175a6cb9f0dd9300f622d550cd46542", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/script-tag/same-http.swap-origin.http.html": [ + "f50ba90ecc0f44d9cc35945e330fba670382b485", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/script-tag/same-https.keep-origin.http.html": [ + "407b5f9abc3fcb09ba7e7aad9cd0da6762db1f1c", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/script-tag/same-https.no-redirect.http.html": [ + "3d138120a5381f5f91a351d00439d0a282efc6aa", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/script-tag/same-https.swap-origin.http.html": [ + "b2c9ebe42d07bec995fdd954759abe9bde4ce535", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/sharedworker-classic/same-http.keep-origin.http.html": [ + "a13ac5aa52e87f25b6eef0053797253c763d5b0b", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/sharedworker-classic/same-http.no-redirect.http.html": [ + "99df1ef7a05f236ada33ff1410de98008297e75a", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/sharedworker-module/same-http.keep-origin.http.html": [ + "2e25290d32a7a96759a01ad3e3a5e6021ac3e56e", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/sharedworker-module/same-http.no-redirect.http.html": [ + "9fe9894faa5ab7709ad4602c13b9cdf49a35f089", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/worker-classic/same-http.keep-origin.http.html": [ + "c7e33944af1b0c0ab4b38b6e13a0efb1a336688a", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/worker-classic/same-http.no-redirect.http.html": [ + "745a2072c4783ad05abe9db6f800d3d642da6110", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/worker-module/same-http.keep-origin.http.html": [ + "8ba6c3918652ae6dd526bc46e7323859e32ac2be", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/worker-module/same-http.no-redirect.http.html": [ + "89979df870bc5e8061d8b64468ca0ed253ff9a34", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/xhr/cross-http.keep-origin.http.html": [ + "fa28cc4b9287591348ccf458d8959e4fa7610ffa", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/xhr/cross-http.no-redirect.http.html": [ + "2b250f81823b82c7d8ddad5b852444c12127f6b2", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/xhr/cross-http.swap-origin.http.html": [ + "02bf0949633d40eff92f6148f67b099d4524f622", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/xhr/cross-https.keep-origin.http.html": [ + "74cb2ec4b2473e4afe20f1e95b9c2d3ffee3a202", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/xhr/cross-https.no-redirect.http.html": [ + "a7dd77b40a037dc230d66348f51274ee2d8577e2", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/xhr/cross-https.swap-origin.http.html": [ + "06291f557963a1b038ebeb96ff882675b6a17b0a", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/xhr/same-http.keep-origin.http.html": [ + "d622fb8001b2c52740ea8aabb3c318d080e6a6f4", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/xhr/same-http.no-redirect.http.html": [ + "620866cc8c6c79b06a5cae21d49b2f7fc9ce357e", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/xhr/same-http.swap-origin.http.html": [ + "844aaa942a7b1df66e7f54a3d5ac0c9e586eddf8", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/xhr/same-https.keep-origin.http.html": [ + "5ece758b2d00cdb9a87ec991d3e471bf8ae19047", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/xhr/same-https.no-redirect.http.html": [ + "66a0b8f765c1becfdd0172949ffa11a79b060d59", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/origin/xhr/same-https.swap-origin.http.html": [ + "8769049dd3e74bcf12d054df82c30ca97239840d", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/a-tag/cross-http.no-redirect.http.html": [ + "56b2f3ebd428fb8c358c9abce252ec02396b70f5", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/a-tag/cross-https.no-redirect.http.html": [ + "a05903573619b907aeee28a0dab0ceab2b1b0eed", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/a-tag/same-http.no-redirect.http.html": [ + "0da54ff311aa9b379af93a16b946691e4c22267e", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/fetch/cross-http.keep-origin.http.html": [ + "755934059669f49cc09b3662f74141fe879e1c8e", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/fetch/cross-http.no-redirect.http.html": [ + "1cbdcbe727e961e61a2e04e00e2a650561d941c8", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/fetch/cross-http.swap-origin.http.html": [ + "1be9c08253453464e87baa854af9bc2966636ef4", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/fetch/cross-https.keep-origin.http.html": [ + "f9cec5bbe3814ea18b425a87378d09ea4cbc2064", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/fetch/cross-https.no-redirect.http.html": [ + "cd9f25729f66957b84db22698b57e73f49901065", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/fetch/cross-https.swap-origin.http.html": [ + "817320a17fb3cf8b049e9f2a033bfd4eaafead5e", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/fetch/same-http.keep-origin.http.html": [ + "214a9566e0c555c831c819e65f784e02deb4f09c", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/fetch/same-http.no-redirect.http.html": [ + "012a26262a31bfe8e03ff9cff706e6bbe424cfea", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/fetch/same-http.swap-origin.http.html": [ + "650f666bed2ba567f7e2a29fea4e627c51bfa25d", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/fetch/same-https.swap-origin.http.html": [ + "7bdb4f42b4ea114d81705a9714b0c271cc2e9d6b", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/cross-http.keep-origin.http.html": [ + "e7f837e1d44d4d6d9e177a7d1b9807559762a2d5", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/cross-http.no-redirect.http.html": [ + "4e6585ad736c2486589fde63d2977cf2d139865a", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/cross-http.swap-origin.http.html": [ + "b871bf35a9e3bfe4780e12356c6d1b2f9d338c81", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/cross-https.keep-origin.http.html": [ + "2044588c1292da753745f9b83e6486593f8595fc", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/cross-https.no-redirect.http.html": [ + "0f862c06304135b2bdedb9a9c29850b405f1977d", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/cross-https.swap-origin.http.html": [ + "d71f21c3ed96caad4a5df827ccaad03ec6b6769e", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html": [ + "eb0ef061240ae4e485d28ae8ad041955c1bf2394", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html": [ + "9f342062f9de3b5b2bd8bb3c31b1b5ea8881226d", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/same-http.swap-origin.http.html": [ + "ffcc395289f029be911ca4b3c06f833bc9b3db82", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/same-https.swap-origin.http.html": [ + "5f32e4e5aa568f74b3b0d1838ea4ddfb86ee5c46", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/img-tag/cross-http.keep-origin.http.html": [ + "1ff8be864028f5e9477493c651087cb2bfcae363", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/img-tag/cross-http.no-redirect.http.html": [ + "0efac7ecc9a69a51c1f4dbf1ec4ee9b7e10d064f", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/img-tag/cross-http.swap-origin.http.html": [ + "96dff0d3ccf0abcde4abcf8cce916df1c2761c5d", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/img-tag/cross-https.keep-origin.http.html": [ + "b087b2d6c361014cce097ec19ad8fdf54286af52", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/img-tag/cross-https.no-redirect.http.html": [ + "ef3b8f5b3f7087740ae2b43900500dbd6b60c519", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/img-tag/cross-https.swap-origin.http.html": [ + "be9ba8e384083fa2eab1417445aa7bd9d9ce08ab", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/img-tag/same-http.keep-origin.http.html": [ + "73a5e8fb6faab04dc0925881843e429bc5d6b56e", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/img-tag/same-http.no-redirect.http.html": [ + "a8ffd34a4cd538655d20f97280a788f0585b09c9", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/img-tag/same-http.swap-origin.http.html": [ + "baf270b01ff0b12d8de6c7fcc2dd76b1d604450d", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/img-tag/same-https.swap-origin.http.html": [ + "e6262c4e5941dc118dc8a67b6e164995e358da46", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/script-tag/cross-http.keep-origin.http.html": [ + "27c14cefd111c745b529df7bf0d8095f62140ad5", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/script-tag/cross-http.no-redirect.http.html": [ + "1d6edaefeac93b09aba74359cb1d71dd4151120a", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/script-tag/cross-http.swap-origin.http.html": [ + "3f38e0ff7982a3baf2c6622604e1465e9f4fa370", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/script-tag/cross-https.keep-origin.http.html": [ + "c59c638c2c0539c33c18b60e259f8fb9947afc2a", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/script-tag/cross-https.no-redirect.http.html": [ + "a2dea0cef9ba8e4015fe0ec065d7545d93adb6f3", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/script-tag/cross-https.swap-origin.http.html": [ + "8c7630c1cdc193e0e23c67a6b0f3c29b7a52c46f", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/script-tag/same-http.keep-origin.http.html": [ + "8bd153100f9d9cc891d7e3d1158315ad0caad349", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/script-tag/same-http.no-redirect.http.html": [ + "ae8c898cda1d3f6447041fc539adaab0a2efe5d1", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/script-tag/same-http.swap-origin.http.html": [ + "5cf5487d53886ef063d049288d17e413e68e83bf", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/script-tag/same-https.swap-origin.http.html": [ + "007e6dcec3f9088c0c16de022c57914294bd7524", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + "dc5bad441694b543954a0891439b43a1c04b365c", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + "4cb8aed4a463e86509145998b12fc75e035affa2", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/sharedworker-module/same-http.keep-origin.http.html": [ + "4178dd24f49eecd357686c2ef265aed1850654b0", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/sharedworker-module/same-http.no-redirect.http.html": [ + "a4248ab8661e33063b3954542df8f4d0d47bcbcd", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html": [ + "6ff2357abf911004ee96ebe559a50fba86b67e5b", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html": [ + "919ab41e910a4f7916e2ae41c7be135d78babe7f", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/worker-module/same-http.keep-origin.http.html": [ + "d8fc840ee8599594304b410b44f25ec9aee7c5ce", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/worker-module/same-http.no-redirect.http.html": [ + "6c38e2f77761f1359a9e2294f151c3e4d0aecdad", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/xhr/cross-http.keep-origin.http.html": [ + "e591a32e979f8192dc3331a5d458fcf215fee067", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/xhr/cross-http.no-redirect.http.html": [ + "6db127950002b36a137a6d7f4558049481ea9e3a", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/xhr/cross-http.swap-origin.http.html": [ + "108333c3518038a69b467ce95e5f59bfdf66b65e", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/xhr/cross-https.keep-origin.http.html": [ + "0d8dbe5b5e2d08d9a99d78fdfd743a087c70d30a", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/xhr/cross-https.no-redirect.http.html": [ + "f098698ba140f131d2919a89f1636eae87b0a88c", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/xhr/cross-https.swap-origin.http.html": [ + "904557f98adbd97144b83846511ce3c88a0b9190", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/xhr/same-http.keep-origin.http.html": [ + "8088a7177bcd3187525460f62c03e5184b972ee5", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/xhr/same-http.no-redirect.http.html": [ + "0181595f086488b5cd0ba0173a888bdbabcb0cc5", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/xhr/same-http.swap-origin.http.html": [ + "9f83a15896b875b532a747484f90b74a591aca3f", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/same-origin/xhr/same-https.swap-origin.http.html": [ + "bbec412cfb4a1ce9beab9230fcc4899e4e733445", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html": [ + "8f4e7c700e5b6bdbb0931b38f8c50e3ebb1b600b", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html": [ + "5bff9424779352d15637c0b2bf2ad8b369975289", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html": [ + "5ae1967e0300a917edcf118235818dee25ffa8cd", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/a-tag/same-https.no-redirect.http.html": [ + "cc3eb5770ef6eb0d3cc6bff2eb76f4a1d2806d41", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html": [ + "ee5afe3a399f511ad05b0fd6d178161ab7a47dea", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html": [ + "8b9bc0ea2a6db2b50941f19414d2e7e6ab7e1f33", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html": [ + "8b84eaaed028fe11e40649179a3ab889738e6892", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html": [ + "0507d527cdb82cec0222777d21c624348c2b9b2d", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html": [ + "62443bb6643135ee5c68769e8662e425d20b894f", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html": [ + "fb4189269c03327d8c01b9fc0d4759eb35a4b557", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [ + "09ba866f5dd542addf3982b8d020db1195b150e4", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [ + "7f0f55c31e11987d6d1f39b58c03705f1a66143d", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html": [ + "4ab586cd21e55394fe8dd0682e4be68694deedab", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html": [ + "3b03470dcfeef98398befc2adb2bc3d0a117ca3c", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html": [ + "7d6d6be171eca14038a32aa6b07cbbbe9b856e00", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html": [ + "3fcb3648aa592d18aa8b5e7bb0a68873fcfc22ec", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html": [ + "84f7e6259703a6fcb54e463e0bc22264e2efa410", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html": [ + "9e1ccd8a98b58221553c92f3fe1e3dfd934629c0", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html": [ + "ff631b90720eab65d829b8a7e808b5d982936d65", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html": [ + "98c15c4b3dda5d5ef31202f87c6b52aa73254f83", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html": [ + "73e684b2aaab351c2789ba05a03896b97ab8df12", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html": [ + "5ccd867b726c4664cfe0510986db48db4eae385e", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [ + "6f94c24eca9593f28414ab80bf3449a7b756cbf8", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [ + "c98b7eb3153540eb1bf6d64c1324c83305f0f89f", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html": [ + "09cd92dbaaf89883fa71671c73ab511662a3c308", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html": [ + "f2971db5e606276e498433bab02f3a357d1d91cc", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html": [ + "874b4f9c5b274655930d12e38b59ee60cba818ca", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html": [ + "c8596aedf884ff48552e72a56252299e193e38d7", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html": [ + "3519bc2f95b59a87c22b2f282c029871dad87318", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html": [ + "16a4c5eb37d583a665b148f2389d1782373d745f", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html": [ + "f0870694f30612027c4cd8b0e253b31f048cc445", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html": [ + "81bdb49dcb6967c4ba19c733c54a486c550101dc", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html": [ + "aceaba602a65bf117721e2a0c998bde075072cca", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html": [ + "f6896c754d74e175015d586cb4c89df2385e6411", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html": [ + "f83e870b2bc8a1bbe6f9c358c6c755190ed8e110", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html": [ + "318e6882e3e4a9e89268bf5e1d8e23544e4f441b", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html": [ + "0632816eeaba76ae93d567e1f19bed0c72ed984b", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html": [ + "e28f174b4576b73a6ac5e6c0b409b62b169fce11", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html": [ + "028d30bcf74646b048fe0507083b61401c249aad", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html": [ + "9698e8e84048ec0a3694bb07cf9fc832f26f469f", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html": [ + "bc05ca5aee8e0e6a61c9d7d5c28167d2a4bea3d9", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html": [ + "66a11d2a52e0ca11b8f3b24e1d360767966f1782", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html": [ + "51950f57f54eaca55ce803cb7489748ff36a9652", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html": [ + "eaf1834d7ab7ebc9d27b4d6697f41e2e5b09fe24", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html": [ + "0933ae62e042484a0ef21b78446c59af16ead46e", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html": [ + "2f5d4527e0f1fad4b0f76336087f546892bba821", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [ + "e044bf4b1b2c8b06bee4917a19b9b2ddc63cd43a", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [ + "0a5187f3c75f3e352dc0d54d7328faebd5290528", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html": [ + "08ca1b91fff328eb95c63b065c97c046bd3a1a3b", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html": [ + "0cb1f70edcefa64786f57ddbde49cafd47a51a22", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html": [ + "13eaf407902e5b0f9364827e869565c3637c7b19", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html": [ + "7ff2cc8e74ea728849f5ec5bf7d557d415272805", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + "1ea30d739ac9238de7d6038c095117ec365494b2", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + "48cfa9f33df86e1e1fe73bcd87a8d1f6a5342042", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html": [ + "03e19e87bca6ea039a8e1f84cbd4fb6ac926f152", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html": [ + "b1c8fce86f79ae326cc9b6165d7cdaaff0852083", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ + "d780abb9c1a40d4ab3c85df1a99bc72dcbb03063", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [ + "1bf8b482d21c47c5652653ae6eb9cbc2a712e17a", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [ + "e6c065e56cee34759a632caf42af70a7bb492c4b", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [ + "19793ea0dd7386674b9f7216a4f072ea949f7f17", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html": [ + "3d7d89d028f10980f8ce02c86eb86fe83c2c8b36", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html": [ + "0a4a6efa23c0c9d03c786c5dbf63e01e93abec80", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html": [ + "7199afd1496ba99ee1879bbe2d065389958a1fa1", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html": [ + "e9e214b7191fc051df7a2374d519160542f8d233", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html": [ + "688c84d56c2d907ab34b7ea158616587fe5c7edb", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html": [ + "fc9672a22a5a687b976cfb4079bd1f1de6805da4", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [ + "bb505dd00dae1ed85b87277b8f95e16983764463", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [ + "5afc8aaadfda9c4db69aa27f9ddb8cda6d83d7a5", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html": [ + "32e74eecae387145443527717188f97cf086da01", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html": [ + "f553f6b934a65e4ef1272291ec0cd97d53fcc94e", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html": [ + "36f9b3b0384a10a557851243eb8a5d0dec16f002", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html": [ + "a35ee1933f01a8a19cc89e3c64a35cd43cfdfa17", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/a-tag/cross-http.no-redirect.http.html": [ + "a15c0e6efa90364f0e41d5f989ce22dd6dc64442", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/a-tag/cross-https.no-redirect.http.html": [ + "b8cd52cfcc14670686cf688f6699743d51a83b82", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/a-tag/same-http.no-redirect.http.html": [ + "2ee7b583fa94a0c6e86a710aa85fd136340c9ce5", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/a-tag/same-https.no-redirect.http.html": [ + "9d9442b93f520dff20892fdbeb014187b402eec6", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-http.keep-origin.http.html": [ + "d8c73147ccbc6a3c672c8c3c829639c7872df3cc", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-http.no-redirect.http.html": [ + "3702a7c309bc778e1c7b315b9ff39307615d3710", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-http.swap-origin.http.html": [ + "e1bf069128b559cdf815bfeca27d72cbc718963a", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-https.keep-origin.http.html": [ + "8ebd430883f69405c1097eb820a3c18e9d3cc080", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-https.no-redirect.http.html": [ + "53b0100e2a0fea6135d9fe6b3161f450e25bc45e", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-https.swap-origin.http.html": [ + "7c85eddf2f421ac007f28d6c4f71f449965ca310", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-http.keep-origin.http.html": [ + "75647bd13c87b636941e88f3019fe3ad31fb0018", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-http.no-redirect.http.html": [ + "0f639b877505c558014141fea9fbc2018b241750", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-http.swap-origin.http.html": [ + "a5bea3a484707fb708c05ebfbec75115fb2dd0dd", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-https.keep-origin.http.html": [ + "bda77ecc5f022425f944ab681d7a9390f099149d", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-https.no-redirect.http.html": [ + "9dae40b12a08488fcf038c9d06e497070d2ef170", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-https.swap-origin.http.html": [ + "2c567e08bcad5eb52b26ac612c8df04148b05018", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/cross-http.keep-origin.http.html": [ + "7f0051ebbd38663ec406e82c4c9e022c19e1a564", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/cross-http.no-redirect.http.html": [ + "349511ddacdd495c05bbfd0577be5bb28a33ccf6", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/cross-http.swap-origin.http.html": [ + "83ba0a7ad76f113f077b3c121a5730e1ed89e734", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/cross-https.keep-origin.http.html": [ + "9dfd5f65fb88168563fc060a4f5d8897b192a6a9", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/cross-https.no-redirect.http.html": [ + "9c1c6af4b04853edb24dc93388b265b32344cd2a", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/cross-https.swap-origin.http.html": [ + "a810e382eb83d6748c97f8a8bf2c8d244236dcc1", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/same-http.keep-origin.http.html": [ + "2f4054b2370c9be60beb5800e3e0d72d3ad66fdf", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/same-http.no-redirect.http.html": [ + "fbd0cd62092cfbc9a8a57584279a5b91ce012b73", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/same-http.swap-origin.http.html": [ + "2d342621c890c41e3b4cdbb3aaf09c574c0c60b9", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/same-https.keep-origin.http.html": [ + "0399f3f8d73e01e1ff250d8fd36259c48bb09947", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/same-https.no-redirect.http.html": [ + "9933dc2583cbf74eb82b8f7e912681adde6f20fa", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/same-https.swap-origin.http.html": [ + "e551f7bffbe5619d546d1366c5fbd7eab8710e0a", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-http.keep-origin.http.html": [ + "eb5e70cf0f4e0fb8942dc021350c2ac3f1be5522", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-http.no-redirect.http.html": [ + "afdb332386c3561daa735f02dc1fa318b8f18f7b", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-http.swap-origin.http.html": [ + "87142c081e6cf3f4f467ff238bcb0d01f5485705", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-https.keep-origin.http.html": [ + "77cc5563183b7960639dc40a91508c852b9ec0ae", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-https.no-redirect.http.html": [ + "1990ab2e933b2a66d6d7b196945dab4f8ca7de3d", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-https.swap-origin.http.html": [ + "5ecd4fbc1b80a3a880d7fdb2d550b7c8dafb3fde", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-http.keep-origin.http.html": [ + "163a9a0791221b0dae9b306f1819c2b137afdc8b", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-http.no-redirect.http.html": [ + "e165a70e0360837af40525a2460f6ad9fd648ddf", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-http.swap-origin.http.html": [ + "4c16f2c255e026fa75d3e914e4ec9e98f84eaab1", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-https.keep-origin.http.html": [ + "5cd9ecad323e7598da915dca1f9d830c1fb1a120", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-https.no-redirect.http.html": [ + "d5129fe1d25f17c26839274e424864a676f71cfa", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-https.swap-origin.http.html": [ + "18d8dc60602b2776c97a9a73e51920829bf40431", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/cross-http.keep-origin.http.html": [ + "242befcdc2cc02f7a67a73c244a969dea758ae23", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/cross-http.no-redirect.http.html": [ + "6928a37709ce26f0db1aba9189b753c6703fcef0", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/cross-http.swap-origin.http.html": [ + "91a78e48d04a8205f3d3311ad3e4838d51a614de", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/cross-https.keep-origin.http.html": [ + "4af70228b6764749512b77cda72d2336d9170c82", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/cross-https.no-redirect.http.html": [ + "b6cf62e4cc36c38d81bce27ea8fceba3df956771", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/cross-https.swap-origin.http.html": [ + "a64e1f3dbb6728ae9336ad35f3a7fd57c40a242b", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/same-http.keep-origin.http.html": [ + "17dba7cac89c493f0b767e4a4f523fd816f22b93", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/same-http.no-redirect.http.html": [ + "8b24901a48059d93436f416dc25834de50af36ba", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/same-http.swap-origin.http.html": [ + "6a5eabfbc8a4f511d657997ffa874ac2801dfd7e", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/same-https.keep-origin.http.html": [ + "4e8347f682822ea82c7bbb073048419abc1994ac", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/same-https.no-redirect.http.html": [ + "4fe1010583bd06d6c82b8dfeb26552c4468e4a79", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/same-https.swap-origin.http.html": [ + "6415cd5f54399e80a3f7a31d0ea5d37c0dfe74e1", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + "d923ce64c7d55d0a6b01180b50af61f308ae8994", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + "2658a467891fe0d8cdd311aecb2592bb88f40a67", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/sharedworker-module/same-http.keep-origin.http.html": [ + "8f4185dfca1aea871af46b6fda7f6ad6a692e3d5", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/sharedworker-module/same-http.no-redirect.http.html": [ + "ee40ed1fa0844f1fd15d8fd74046f7aee4de6644", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/worker-classic/same-http.keep-origin.http.html": [ + "29f3acaec1ac1ffcd1fb73fb76dc775aede8970f", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/worker-classic/same-http.no-redirect.http.html": [ + "2336b56ba9585055bea14a678056c90d1cdfed61", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/worker-module/same-http.keep-origin.http.html": [ + "3c7ef80c95c7eb83a01edd177607c674c3a0d489", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/worker-module/same-http.no-redirect.http.html": [ + "5700833b3ec1f0953912952a7645165a00789dce", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/xhr/cross-http.keep-origin.http.html": [ + "4441c8b61226836d15d06d65347099ed5421470a", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/xhr/cross-http.no-redirect.http.html": [ + "3846cbef67a949e55a41d2a13f34f7d333d54996", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/xhr/cross-http.swap-origin.http.html": [ + "125cfdaaea70d27eb3534bcd2787cc6b6c705ff4", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/xhr/cross-https.keep-origin.http.html": [ + "03ef5b9fb5c4b5e7042d10ae5c26ff710041a762", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/xhr/cross-https.no-redirect.http.html": [ + "52221765d14e945777aa6884c4c34ccb1af32df1", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/xhr/cross-https.swap-origin.http.html": [ + "27424c21dd5cd16aa0447cba70f871126f334ef2", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/xhr/same-http.keep-origin.http.html": [ + "d63fb55362169a39b58158ee97404ef55caf0500", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/xhr/same-http.no-redirect.http.html": [ + "b7f96b6bf4f052afd9c36e8c6b8fc4a98bcc07e6", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/xhr/same-http.swap-origin.http.html": [ + "6eceb6e22dbcde3a8fc9d21820627cf1cfb856b2", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/xhr/same-https.keep-origin.http.html": [ + "53421d4c0ffc406bc9a40500ef4ae2b91c2c5172", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/xhr/same-https.no-redirect.http.html": [ + "7287984faf97da15f952b41d93157bd494fc1a19", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/strict-origin/xhr/same-https.swap-origin.http.html": [ + "13e20da2fd69f2bdae09da2cfaf6e6fc419dfd27", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html": [ + "34bb1c4fd28622137ea668a3563d7d9c196679ab", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html": [ + "603c3386882f744103726701eeac5f09c0759991", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html": [ + "8d86bc65a30c34d61843b1813f535260d0da952a", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html": [ + "209c6794f4bb8fc3aca80cb60e0f9fe4af88569d", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html": [ + "ba745454683ac7f57cc09a590ae17c73d347d48b", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html": [ + "3482acfd3ff802fb715616d1159eb6916f766e08", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html": [ + "70cad21f89676167c26f605193bb4148501e828b", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html": [ + "35cc7e0d5aa88b0fb5f0e33467ab3e0b2786d8a4", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html": [ + "6a0135272616b10b140bf62fcbc036d549ab4c2a", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html": [ + "5b7af5dbec8af83d03523d2f1cc49e7a21e0de9d", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html": [ + "b3757f717701c7f1165870ce53be9e984c78b596", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html": [ + "5ec9566b407f68992a63c31f3cc8f56d8d8da4ad", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html": [ + "bede71fd70a59b6c56579d6bfe2c05b6a059cbb5", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html": [ + "73ac13f9200d5459ce7d7ecb52465243c0252635", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html": [ + "ceb87d3f10172f70ffe9e598bac3531cb21c13a0", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html": [ + "16d4263d01c090e875c132690ed3d410ab13413a", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html": [ + "2f802ce6889cbfe565aae5e8debaab381104b1c5", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html": [ + "4fa165ce0d706408f7961a36f7cf6ae1397c10b0", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html": [ + "6fee1b1faa16caa7917ff6feb8d841c0e54c0d3f", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html": [ + "db8e0994899084b79f95736548bc0265f41efba3", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html": [ + "8abc987c36f67ba725b66c08f8bbc5cce0fb3cd4", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html": [ + "993a1a41fcbdee7fc2c33e55a1b07e71108e5e70", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html": [ + "aed76d275190006cbd322859ff06c3375c94e7be", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html": [ + "3c2396950f106a7de3a2f473ebb71f64923bb739", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html": [ + "4568cf1e985633fc5d46477c65592a6258b66b32", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html": [ + "88e71db4d8ea07c9b69d91e5f8b5c0d0545ba86c", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html": [ + "82145902310761793f6cfa68e7fad113b41c70ca", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html": [ + "02d2c3749f7e30281ffd685dd78f956c53fff5b4", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html": [ + "b876dc4e0e478b817a2bf9c73fa6b13b60dd3f77", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html": [ + "013892fc1264c3092f37e1e5680952e05b0aad5a", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html": [ + "3873bb380b4c4b8968bc9b0a6f1a46a399f6d513", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html": [ + "1a2512a7c69062b07a26db6468ef005b8a9a45c1", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html": [ + "9c722c9b51cd97d653b59c54e18210006f65f94a", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html": [ + "d7666572996391045e6f1ce52c384cadd70dd8a8", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html": [ + "db1c7c0a010a35212f92e4a3ecbcc67f13ac95e8", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html": [ + "8d47f095f4646f20eaa5724c0061315e44152d6d", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html": [ + "ece921d5adf5dbdd5f5f75b98ceca901ee14396b", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html": [ + "128a542380e6575924dd5e4b2b8b411b4e042a09", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html": [ + "7bfc51aa708009e90ecc4f04c6e74a63ae8fb680", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html": [ + "eecafe8c51c39a2ed9c2d16061c93e0fe44d7df9", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html": [ + "340b2c031e180906804eba673df717ff0aa9a3c6", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html": [ + "f1e120fc44e6ebc077d83c37b04f31a3593b99f5", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html": [ + "7969bbfa8781502393f908196289e4a0ec1dea2d", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html": [ + "c66137720b6dbbd86f2234640448d90de4d39d39", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html": [ + "97f7c6c7421303a72b2308078253d884cce9bf07", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html": [ + "fd747fa4c2d7113be949139d132a58b81e4961cc", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html": [ + "e327237cea65331bf26c0c27377e88b021c0edeb", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html": [ + "7272e9a765fd0e856d26bea99d61a3de37395c6b", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html": [ + "e0046f7597694a9608bb3cf4f9da80ac9dce264c", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html": [ + "ec0c22ad56371eb4bb9c42246499b8539e57ab86", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html": [ + "5c16ca12135912bc5bcd9ed3362176e39a30f288", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html": [ + "41139ad07b2c32fd0a3738b288c7b76502c378fd", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html": [ + "594d303e68168cf13f12b43c7a989f850cf245f5", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html": [ + "06ea15abe2307b6c30034e5c353573b7ca99ba42", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/sharedworker-module/same-http.keep-origin.http.html": [ + "5b74bcc563a93588f8497d7718a666b552227361", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/sharedworker-module/same-http.no-redirect.http.html": [ + "af11744a8bfaa728c39a794b48ed916def54f0ee", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html": [ + "d403ca73360ef952905a26ce9b3f12447916f03a", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html": [ + "9d148fb181a255ebb7725c09c163ac1ece789157", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html": [ + "67538d49b811301063402f0e2b131b49d673986b", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html": [ + "f1e0c3b11a465a6af4ce908f401865806328beb9", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html": [ + "0cf98782c07cbed918aa3e892163eb27685defc6", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html": [ + "fa89f63a8a62d5ea4a99b0f23131c86ea401d8a5", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html": [ + "67316862c1219631d25a1fe53d624b9bec334910", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html": [ + "a7c82905c782839ea22eb572342b4214931c1cfa", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html": [ + "4c317bb0dc32783338d3dbf00f16f72ec73f9fed", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html": [ + "c9b800edd3a7c056b14d713992d299f563df5c13", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html": [ + "04439c04f448d14178cf2382c212d194cb7f10ee", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html": [ + "118247ec06a99cde39f488f53c5bb9cb1f042015", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html": [ + "1d6c036fabbaf1a13b40e2be84a0a96d37a4851f", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html": [ + "1d272b7e26c7008518d576e9d476d472fbcb1815", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html": [ + "5b290f1f888fb10cd536ae6ad3bf34f0c7090640", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html": [ + "d7d7ca6a461a4224037fda16476262d1d35b9e2c", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/a-tag/cross-http.no-redirect.http.html": [ + "b356da1e8e0fc200c0abc587d9976d46937ad8bc", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/a-tag/cross-https.no-redirect.http.html": [ + "d4553125f7f68921ff3f701b18e3742d8a6ed717", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/a-tag/same-http.no-redirect.http.html": [ + "42deca6f5295177c441d302c034266fd98f2b9ba", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/a-tag/same-https.no-redirect.http.html": [ + "783a286b7d76a49455468a95c5d1e2c132d037ad", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/fetch/cross-http.keep-origin.http.html": [ + "e096fde69be75e55c8de9c1e9e6d0d74548b8fc3", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/fetch/cross-http.no-redirect.http.html": [ + "01ff5fdf718ddc7c1b1a1df1dd3fca5a570ca36b", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/fetch/cross-http.swap-origin.http.html": [ + "c4d1442990e68f85b122e86bc4bdd8624e7619db", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/fetch/cross-https.keep-origin.http.html": [ + "8967fc788187523c08de14251f979e2bac16e684", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/fetch/cross-https.no-redirect.http.html": [ + "b08192baf1e23d7f3150883828607e137ec0b973", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/fetch/cross-https.swap-origin.http.html": [ + "171d908525c00195d1cc48a1b3dc855f0c8eb4ea", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/fetch/same-http.keep-origin.http.html": [ + "d06af26170b076925f308602e7af0e38825905f6", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/fetch/same-http.no-redirect.http.html": [ + "4ec30ea3a03162200934bbe48e0a17bdc9a3db48", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/fetch/same-http.swap-origin.http.html": [ + "1a6478b206d05887ecc85f63801d2e9c0bbb7d0e", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/fetch/same-https.keep-origin.http.html": [ + "0b07b0264b1d1ed71cfbc1b12493abbbb940cb23", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/fetch/same-https.no-redirect.http.html": [ + "5487c960fc6a0d5a6fae3584bc429316a1e2af52", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/fetch/same-https.swap-origin.http.html": [ + "0cf4d2c0e06e53d721bcc01f5e1029ce3a89fa60", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/iframe-tag/cross-http.keep-origin.http.html": [ + "c28f300af23869410f416216937dab3beed9fdff", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/iframe-tag/cross-http.no-redirect.http.html": [ + "e04e1b902b139de73121d4c00199a0627b0c552e", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/iframe-tag/cross-http.swap-origin.http.html": [ + "70dee43e15888cdb465f3249201084f01b57bce9", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/iframe-tag/cross-https.keep-origin.http.html": [ + "6e45e08e90d889a076d7536af9d02364691b13cb", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/iframe-tag/cross-https.no-redirect.http.html": [ + "9fcca116c4f332c04faa4a122b11620fcaa41def", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/iframe-tag/cross-https.swap-origin.http.html": [ + "c2025cbcf5ee7a1a66b50e49ee569b9a31d85269", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/iframe-tag/same-http.keep-origin.http.html": [ + "81403d6921c49fb21ece452578b80b70276c1bb2", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/iframe-tag/same-http.no-redirect.http.html": [ + "e502e90e6e1a20a862c316d2b02e060b1cba9cb6", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/iframe-tag/same-http.swap-origin.http.html": [ + "b1aef2bf4c702fc0da5f71aee345fc113b6d2af4", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/iframe-tag/same-https.keep-origin.http.html": [ + "c3033a6e899616c84c3e10d7054a11e12af784e5", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/iframe-tag/same-https.no-redirect.http.html": [ + "08805f9cf2952639320e90db966e54ac41cbf07c", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/iframe-tag/same-https.swap-origin.http.html": [ + "da8d438a7a28129f5ee6eef331ef8dcac459abd7", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-http.keep-origin.http.html": [ + "dca8e28f878bfa29752db5c35e39a434b932ff1e", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-http.no-redirect.http.html": [ + "dc43ea6210636ec0f237395a61a72454084425e2", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-http.swap-origin.http.html": [ + "565e2dabf94f6f556791d9001ef93aae16eda60b", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-https.keep-origin.http.html": [ + "3774470b3cae7364734cd745b673294f3984551d", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-https.no-redirect.http.html": [ + "29d6f99255f92fbd5003c72d76f013b7903ddf1d", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-https.swap-origin.http.html": [ + "613c5af5d19e10a52ecb9b795eee7d164e5a46f7", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/img-tag/same-http.keep-origin.http.html": [ + "b4fba605c360c63278fa4088ac42cd5bda459fa1", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/img-tag/same-http.no-redirect.http.html": [ + "31ab15865fdcb45d6562c82cc9e00df678902aeb", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/img-tag/same-http.swap-origin.http.html": [ + "c655f801454b2ad2c12b9ced5faf9cb955a7fc3d", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/img-tag/same-https.keep-origin.http.html": [ + "cdf523b75b8c59f394a2338f8d75fc0a1db82cfd", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/img-tag/same-https.no-redirect.http.html": [ + "56006e38eb4fa125a6a00f3b3c3a99cf5610b5fe", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/img-tag/same-https.swap-origin.http.html": [ + "76f5588f8fe022f2f8b67d6939457238d3fcc6a0", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/script-tag/cross-http.keep-origin.http.html": [ + "61b3dc353dd58780d83bbef36be35928a0534536", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/script-tag/cross-http.no-redirect.http.html": [ + "22dbcf6e0b0a190aa63126aa6b030e6668e98c4b", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/script-tag/cross-http.swap-origin.http.html": [ + "ba70f3e5394dd6512d76452acd3faa7d9298682c", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/script-tag/cross-https.keep-origin.http.html": [ + "757034e2d85ae2c7f6fe0ded27f55351efae4c2f", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/script-tag/cross-https.no-redirect.http.html": [ + "8147e540a85bc4bf4a975e537284f30628ae79e9", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/script-tag/cross-https.swap-origin.http.html": [ + "68aa797c7f2bc3bf25ad3c9c703aa0014a91d8da", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/script-tag/same-http.keep-origin.http.html": [ + "5296cde8939d8d040d0ed118b6bb9238e03461ca", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/script-tag/same-http.no-redirect.http.html": [ + "30ae08271c53440779784cc9b02c996225b55d61", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/script-tag/same-http.swap-origin.http.html": [ + "62d681f182e119853ff4dd6f21df8df0da253a4a", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/script-tag/same-https.keep-origin.http.html": [ + "43a71d98fa9b5a53f049820a448102a69ea7073e", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/script-tag/same-https.no-redirect.http.html": [ + "ba7fa7358ded7223e6cc6b6eeafde1f9523e4366", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/script-tag/same-https.swap-origin.http.html": [ + "7e0eb5ae616722fadb70c4736a26a7cefacb4df7", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html": [ + "c48229fdc5e6cdf789722d8d3fc9e7d98156f9ac", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html": [ + "1dbc19eefcdbde62b1447b925e22f682c2917068", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/sharedworker-module/same-http.keep-origin.http.html": [ + "0f642dd00bf1adfe96c548dead542ca637e1e1bb", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/sharedworker-module/same-http.no-redirect.http.html": [ + "28ce5d3c446a47614729ef9b6b349a87f5c2b549", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/worker-classic/same-http.keep-origin.http.html": [ + "e521998811190b09d29d1176192404722d819cd9", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/worker-classic/same-http.no-redirect.http.html": [ + "1dd9edc83536d479b761d274667ee2771ee54e26", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/worker-module/same-http.keep-origin.http.html": [ + "5fbad9e6837ea830dca21c1f437d219d254d4c83", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/worker-module/same-http.no-redirect.http.html": [ + "1c7f32f25369c15ce4450c6050954708263597bd", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/xhr/cross-http.keep-origin.http.html": [ + "fa6538704c2d91b95e68733b13c0d3833e846e5c", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/xhr/cross-http.no-redirect.http.html": [ + "86b997fc9bb86b88ef16a67ce2cb00e1a63fed9a", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/xhr/cross-http.swap-origin.http.html": [ + "2b88e6fd07465e78f998f66fd5000dc6c3e8d0c1", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/xhr/cross-https.keep-origin.http.html": [ + "e573fac89305e4eb658663928d77b8bd51326846", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/xhr/cross-https.no-redirect.http.html": [ + "a8ffa5661e9c479374da5ff950df0e387d801f2c", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/xhr/cross-https.swap-origin.http.html": [ + "4bd7d3fe73fb577efb52eb608e2a13442586eae5", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/xhr/same-http.keep-origin.http.html": [ + "3922cd7832aa615554eedbfefcd8af74f40aa74d", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/xhr/same-http.no-redirect.http.html": [ + "a583f1c93c5c7d283c2d7be268283b0b368d7941", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/xhr/same-http.swap-origin.http.html": [ + "e7572b32d85bfe1c057503cc51e47a47af35e570", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/xhr/same-https.keep-origin.http.html": [ + "8980cab88fd31ec4a1e989457e052bdf9a33b6dc", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/xhr/same-https.no-redirect.http.html": [ + "5008a4a04f1e5e82bd755dfe66456237baf726b9", + "testharness" + ], + "referrer-policy/gen/iframe.http-rp/unset/xhr/same-https.swap-origin.http.html": [ + "f458232b5937ff2a80ab05baf297ca67823861c5", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html": [ + "0856dd60dfe89d401c487e83ad62e95253cc17dd", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html": [ + "fd1d6cb908499a707915c5a5d3296b2c595765c5", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html": [ + "5604586150fd0e130a870829bd894ae6c3935a14", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html": [ + "6b4772c04b336930972cda16f022c32011d5e09b", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html": [ + "0f2a564c3b68b934b92f47f234e31d2d83be3f61", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html": [ + "3c8153d962f9e4cafb26c727a720099667f5759e", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html": [ + "5f0051a043575af1911366d304a737b542cb3067", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html": [ + "ea9dfcd9229719b520996b6fe1effad5a1b5b059", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html": [ + "d9bc5c2ee55608250cb31ef35106cdadff5ed3c2", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html": [ + "eb96568c04990b99316465411d3463a48ec98e0a", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html": [ + "1cfec9d648ea55b5c306d0cd740e9c2354c1f87e", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html": [ + "1c8506015ff19832dc7b3bda2ea8d77b1d761894", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html": [ + "e43e4feb37924ff41eab27cf3f1149855d6f8f8c", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html": [ + "90c5987b134622b6a15d94a785c90384b954c916", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html": [ + "60032c3f72883984ce86582151a02de7b4c0a936", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html": [ + "7ad291cb1c1bec944617fb34f07ff1c85c156016", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html": [ + "5324ef50ba3eaa4e8c520325e52adf1c7b10af73", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html": [ + "64ec01eff94446b82d2dcb88bd7001103a1a9e7f", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html": [ + "f9034cbfc1e8f02c8c29db0d9d36d16d6c9e40c2", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html": [ + "8278810f4758c358bcd8faff2415758cc376a102", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html": [ + "c61d28822676de30078db98edba4ff8036dc3615", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html": [ + "9d23b1c163cc8b2904abe3dfb4a6b5d8b91eca22", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html": [ + "746b5add7329c0502428055f823210aea14ef9d2", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html": [ + "4a725a4a1aea697aecb7c53369b3d9d72ea3b85b", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html": [ + "a9b1288dc28b71e7ccaa05ff87a3dafac0633262", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html": [ + "bff41a6b7621f9f231369159cde700cb7fe38fb8", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html": [ + "f5c46b11039d48ea7a0f13be7da2573aac5db27c", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html": [ + "ca52358ae7d857ae114d573d78b39e165c0e4a42", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html": [ + "4879c8432b8e9f2f916388ddd8eb39cf46ba16d5", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html": [ + "16c11538c36902e83f25ec6959304abd7ad5bfa0", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html": [ + "04b5c9e6900b2c11451b9de83144e2239159d60b", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html": [ + "9fa393762f966f220ec36f3fb6f3c6aea48f1f1f", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html": [ + "291ef87d3b82dfd291e9ff9e1dc426c8c79a4b42", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html": [ + "95e0a5a340aa1689dea0aa0bfba6606f1d01e865", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html": [ + "f470b57086b2a998ba790587d1425522181ab1e2", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html": [ + "cb7cf373b5f201247250470367a84b8911845d8a", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html": [ + "a256ec8a82ff1a695c8ef49569db804e52d2f9a1", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html": [ + "d5b036fff9a2c6662ad33f331098c83576bf770c", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html": [ + "61aa86e87db68119894ffdfa78299f1ae90f09a4", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html": [ + "f08b3780dadb976720348325ab7baf4c2f91d11f", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html": [ + "24b806a345b2d198d6ba55a6fb79c8463ea751e9", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html": [ + "35634b3b54d8e5b7196a7a624422bad8d6e095e1", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html": [ + "ecc149c6ceaa914e2f73c4a026bd6187e8a0b45f", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html": [ + "c71c9b47106b4abd23029199281aa074124fefb3", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html": [ + "8f329e62dac1f51ad6be4c1faf13d8ee2da723cd", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html": [ + "8085715d22c5c47820651108fc7f13f31c9264e3", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html": [ + "cc94bde30a64443266e109f5b2d5f3375f2c4db9", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html": [ + "d9b8215d9ac64cee953c9971266334e3190612b3", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html": [ + "d430d24d0f8dbaed8851f450e30be95e60b5219b", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html": [ + "c13f2b52310d5a06e55404367ef1c34216a8485a", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html": [ + "2a67acf77bd13397c206f7d135f855482ffdadcc", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html": [ + "97e8794de378fea62ba3e7006fa6d10177c47625", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html": [ + "f79762d47c40d5ab4be770414be87b63cd18ced1", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html": [ + "8eb2cdd3a294fdd4be43a58cb9d64dd027dbf4e7", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html": [ + "7b3fa647c6bbe653f0ba5e4cc94aec7de53ef1c8", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html": [ + "15bba73460dce7e6afdaa4e698efb2f75d75fca6", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html": [ + "355a3b4a91d812566b9c37b0b7bfcc9bd6434ca7", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html": [ + "d5b47f7050ba0393fa81e37f5b5072a510d0a1c2", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html": [ + "f3f48d20fecc37154e341aa3f37a46d6d4218930", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html": [ + "11e1ab4301c03d6a8793a2bd546d1065246edfce", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html": [ + "30e0635d5681c16e77ddca0952d6acb22a8e1838", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html": [ + "a892f33ade827943010048be7f2d7bc074423869", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html": [ + "e9a6dcc2fafc0a070b699307fc1ea5ef5863fb20", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html": [ + "bff2601d4526eed0872d4705b76058ff7bf31891", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html": [ + "92297125a506d37c5d3c1d24d62d4edd5fa892c3", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html": [ + "3f683a7c6a7251f79f5f651cfc95981b2ed3207f", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html": [ + "4bc936c1f4c1ec96a51745e7c7be4961b0551b9a", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html": [ + "1d62c09156f7b7e7920e886c2ceed21cc11f9506", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html": [ + "f21dbbd29be0f01ab48c92c1754199edd5f7a06d", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html": [ + "98f63cfd84d3e384d555a8e0f40dcfcb4772c792", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html": [ + "fb960bd12d6bd036b696594c063c840670624f02", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html": [ + "10eb60d02f77ffb49f4936698abbd6048a3aa6b4", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/a-tag/cross-http.no-redirect.http.html": [ + "2b7d08856740804b084dd1ea219989de65bbbed7", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/a-tag/cross-https.no-redirect.http.html": [ + "3a85457e53d6d03ff1140c5edcf9a1aab020f466", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/a-tag/same-http.no-redirect.http.html": [ + "ac5599226277a1884237ed397f99e593b5069c04", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/a-tag/same-https.no-redirect.http.html": [ + "db39d5dce57917aed06189cdfda56840b65e3232", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/fetch/cross-http.keep-origin.http.html": [ + "d2b101db20a29bae02241ff547eaa7dab41dd02c", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/fetch/cross-http.no-redirect.http.html": [ + "e017d291aed7d1612f485b5769948c91f627cdd5", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/fetch/cross-http.swap-origin.http.html": [ + "4ea6f334784380aace2f0734c0b07f7f82713ffc", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/fetch/cross-https.keep-origin.http.html": [ + "9af2ba0db2c40fe75839c7e7fe07adba4f484c38", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/fetch/cross-https.no-redirect.http.html": [ + "9a252d76b23ca6342a466e1d04b125112ecfa2cf", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/fetch/cross-https.swap-origin.http.html": [ + "0c00b96519633370a90c0bee7732e04cd361ec00", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/fetch/same-http.keep-origin.http.html": [ + "b2de42bac51db2d092eb8b5482359cfdb8045be0", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/fetch/same-http.no-redirect.http.html": [ + "a0dd0ed5fe8921b8d619a9d5b98133213496f9a0", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/fetch/same-http.swap-origin.http.html": [ + "b3a137f3c30f9ee367bfc338d7ce31de13c6ebba", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/fetch/same-https.keep-origin.http.html": [ + "51abb646d7bd50a6ce8a9ac54b01c2ed8ba2a054", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/fetch/same-https.no-redirect.http.html": [ + "dc20690f5a1fce3b490242280a1cbb1732c824b9", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/fetch/same-https.swap-origin.http.html": [ + "06a9d29052d81e2cab7e0779ab6f88b1a31e004b", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/cross-http.keep-origin.http.html": [ + "bf08585f9795377fa5f4c02f84b7bf648a1c583f", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/cross-http.no-redirect.http.html": [ + "11523be8b23d8df5e4e787748da13d760e7302fe", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/cross-http.swap-origin.http.html": [ + "15fc496d72ccd406cf5f07781765313a0ebc69c7", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/cross-https.keep-origin.http.html": [ + "da8a0ce456e8ce57aff165d370757b256618a943", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/cross-https.no-redirect.http.html": [ + "0cd42be3a5c69c12c577a896f3ba4ef24bbbc461", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/cross-https.swap-origin.http.html": [ + "587baabbf3372ea02da0ece90b52ca1261147eb7", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/same-http.keep-origin.http.html": [ + "010cb7a909424640ceb18b3506a709d236ef212d", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/same-http.no-redirect.http.html": [ + "e2594948b8f8f37d32742969d4786840116a5b56", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/same-http.swap-origin.http.html": [ + "2040cdc74c83efadfc8aaa3fb37574ce304d42a0", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/same-https.keep-origin.http.html": [ + "840da90ca74077cf222cf5e0394251ee5a7b721f", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/same-https.no-redirect.http.html": [ + "b548bc92ba09efe067fb83ae55812d5d01aca7ed", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/same-https.swap-origin.http.html": [ + "3852ed86a545c8ab6fb19c0e074592d7f1b27ea7", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/img-tag/cross-http.keep-origin.http.html": [ + "e4d047ba7505cfad8e279ed142367cd1465e5704", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/img-tag/cross-http.no-redirect.http.html": [ + "b2b3b7650947eee95681ee45a91d9eee7e3bdecf", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/img-tag/cross-http.swap-origin.http.html": [ + "e4d59f0eebf903cfeb4f8b5c01d3dffe30cc736f", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/img-tag/cross-https.keep-origin.http.html": [ + "ccbd4145749b526c5c61657bcf85153377d2ccca", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/img-tag/cross-https.no-redirect.http.html": [ + "3f69921a3dbd8f525cd3cdde86d17013355953da", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/img-tag/cross-https.swap-origin.http.html": [ + "c6a19c2aeb6c1f9049c5ff71a5d315d4f79e2acf", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/img-tag/same-http.keep-origin.http.html": [ + "32fcb5e2d6fd7414b99d402676772500eec906d4", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/img-tag/same-http.no-redirect.http.html": [ + "49609cf5a4ad8f4811d4cd6f17fd5f87f80f9e6d", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/img-tag/same-http.swap-origin.http.html": [ + "3d9dc67d1b78d19a7093c871d1726ca10418d7c8", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/img-tag/same-https.keep-origin.http.html": [ + "1ea0a3752dbc6981a60d1e6620d6f24c442cd5d7", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/img-tag/same-https.no-redirect.http.html": [ + "02c5e5291a2900f0d50aa29a7b4ada088fe746fb", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/img-tag/same-https.swap-origin.http.html": [ + "e17755c0cce8d57eb104e9abc4e0c4f8d5db6458", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/script-tag/cross-http.keep-origin.http.html": [ + "20b662df76ae71ec22af6883fe4f498fe0c36055", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/script-tag/cross-http.no-redirect.http.html": [ + "240f1b49a3511d1e590349327511e506f09b8508", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/script-tag/cross-http.swap-origin.http.html": [ + "17732091351a0e79c9abfa455c13d760e0a2fb1a", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/script-tag/cross-https.keep-origin.http.html": [ + "ea0061e6e7df97efb8d2d1a643aa0339c51cc8cb", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/script-tag/cross-https.no-redirect.http.html": [ + "734f7b5aea74b21d09347f14c974ce4c6ab8a896", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/script-tag/cross-https.swap-origin.http.html": [ + "67656f63c0ad73ab0398264f1db4e17cb3127bd0", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/script-tag/same-http.keep-origin.http.html": [ + "8a0fc4ceee420472a420c74fb054c22845943bff", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/script-tag/same-http.no-redirect.http.html": [ + "098afa7850ca799eac587e13519bfc4bca9ec197", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/script-tag/same-http.swap-origin.http.html": [ + "278ae3ca0afac05cb4f7db09d023df7f1d9344c4", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/script-tag/same-https.keep-origin.http.html": [ + "7894f567a7ac1e6f8fc9c91838aea9662716c403", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/script-tag/same-https.no-redirect.http.html": [ + "38dfdce94ca8abd26119cf8620116ac96d202d54", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/script-tag/same-https.swap-origin.http.html": [ + "06b750064aa434a70c7481d3c5d58bfd2f1e3c63", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/sharedworker-classic/same-http.keep-origin.http.html": [ + "dd5c8a41184615f01fff640ded25744967af7cbe", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/sharedworker-classic/same-http.no-redirect.http.html": [ + "a914c10d0af6cc599c596055064fa91f8791e29d", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/sharedworker-module/same-http.keep-origin.http.html": [ + "1e7be717a7434dc7c7364b64f96fad2099addec6", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/sharedworker-module/same-http.no-redirect.http.html": [ + "e3d0f32bd315897294a3d3fb3b053b4aeb705e17", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/worker-classic/same-http.keep-origin.http.html": [ + "b19b90ab5681d5615cbd09b64d5e10412fb5cf25", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/worker-classic/same-http.no-redirect.http.html": [ + "3f84f298dd298f990c05b556c64023897c2a705d", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/worker-module/same-http.keep-origin.http.html": [ + "c59df9757391bdf207d2ed3e53378a5df7ed6a82", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/worker-module/same-http.no-redirect.http.html": [ + "cf7e209a2fbe3efb4830b74aa24880ab3e02c88b", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/xhr/cross-http.keep-origin.http.html": [ + "397a4e5fe9f64781a6f817f3cf5be32b4901baa6", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/xhr/cross-http.no-redirect.http.html": [ + "d10e642a725819b9c0704d78252bbf4ed0fd8b8f", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/xhr/cross-http.swap-origin.http.html": [ + "4adad7e6738a7af755a4d14144fe596aeb6a2d28", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/xhr/cross-https.keep-origin.http.html": [ + "c4150cd1c19e5faa53c3ca2ecfd2ec000188dff3", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/xhr/cross-https.no-redirect.http.html": [ + "bd1adb22332a9899c95d58cf9b8dab7fd8db07b7", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/xhr/cross-https.swap-origin.http.html": [ + "822487de18b766409ae64633a2690b27330ab2f1", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/xhr/same-http.keep-origin.http.html": [ + "2cd6c666738f35172b67949354a01bf087d452b7", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/xhr/same-http.no-redirect.http.html": [ + "ab02834f0dbfddbfbb2a68c3e8e7cba3a7533960", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/xhr/same-http.swap-origin.http.html": [ + "82be13a5996db5fe08dfaa1b70ac557d141033d0", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/xhr/same-https.keep-origin.http.html": [ + "7db551866db6ce510de8bff4b7ae010da4e9d193", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/xhr/same-https.no-redirect.http.html": [ + "ad86c86cddb5b9040ae05d2307115664327dab56", + "testharness" + ], + "referrer-policy/gen/iframe.meta/no-referrer/xhr/same-https.swap-origin.http.html": [ + "351b64e50e71b6c89f2dfedf35a164a00f6ece38", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html": [ + "4625908d69d66ddc3f5b8fda83a01ba7219da5e5", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html": [ + "7884e4a353611dc984c3539a7761f93ade8aed46", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html": [ + "5a0e414c6c4c7415530fcafe767a8844c70fd344", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/a-tag/same-https.no-redirect.http.html": [ + "0260815bc445cf27067c1b5e51f5050df54e704b", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html": [ + "02c5e29136303294435a81baf87ec5d2a2d1b665", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html": [ + "af714b6527186f0a7b19bec30052c3df73cc24d8", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html": [ + "6c5dfe5a8f76b4273fdc267db58ee12c5fd2c5ad", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html": [ + "686d843f5443f1d184f3a9a95e863d98f3132f0e", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html": [ + "99c0afd4643bcfda4b0ce8988910cc9aaddc0802", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html": [ + "55d1077fb9eb29dcd9ac4d94231604c309ef7e01", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [ + "5ba4ba96d74cd2cbb5fabf9eab1bedfaa14e31ae", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [ + "fe3fe78723847f55fb010c6eb99eb5ce4835fba1", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-http.swap-origin.http.html": [ + "9fe0da5383740edbb9e4ee0690dc1263baefb28e", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-https.keep-origin.http.html": [ + "0b303315ecb9646a7a59dd69312be188124a3d1c", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-https.no-redirect.http.html": [ + "53923cd04b1bf80a60b9ecb1652f2b93e9f4ebe8", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-https.swap-origin.http.html": [ + "6cc0df42dc9f7f75544a4c1e30adcb14c00759a3", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html": [ + "d1823e29824b1647b1a1d134cb5dc7b09edd67f8", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html": [ + "d301eac298ab9557fe4e6f05d0514da29527fefb", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html": [ + "60f10bcf409f93b49e8eb2a18d22128760f3531e", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html": [ + "780d874ac16684cfdd21abe688d11ce62184b2a6", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html": [ + "575406d9e29eb407b301a63a892a722b021bdfe4", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html": [ + "8a06f757e077709cad73fa2dbb3ed1078c6731ea", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [ + "249bbae2104d4da4d1ebdfd0fd72f892eac182bf", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [ + "49199a61fff523d665b7fe328a8c596f20cbe06b", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html": [ + "a45a24d0ce45f0c4a4c811a9b98db8b27c950eea", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html": [ + "9351d9453395606c2d80c9b06192ed1f30cae153", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html": [ + "a9d6f28f57319824af964a340791d49930034ea5", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html": [ + "f973f791c8010da1a78d09f3cc1b522e30ad235e", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html": [ + "6e2cc29943b2503956947601633092cb439f663b", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html": [ + "4dbcd2546726a2a0bf6c0918c357f8b40138a996", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html": [ + "6ec8964ef803b8d64eaa4bdf7a62e18a68941910", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html": [ + "af4f62058117b44409e972a39e58bb827ca2f552", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html": [ + "23390144d41473af1074ac5d0454015fa3446c5a", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html": [ + "1d141c4853747885c1032ca4cbf9b115c8b789f8", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html": [ + "21bfa65bc386f46b3166edd87a6c374c42a80b32", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html": [ + "1bf48c48d4a6680b49eb4e561d30f26bbe5e5367", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html": [ + "f3054cd8dca2bac21f507c6d087a9fa55799ff61", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html": [ + "e16c4a22184e1b627707869d81ba9c2c6ba6c848", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html": [ + "9c3f9a6aec8b5486834974da6076a3bcfd853b16", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html": [ + "f9a7804049741f850a06e2d13bb35401dba828b8", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html": [ + "71440c69da4613a7a82f6df3d52714af79611ea3", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html": [ + "c7e428c39fa2fdaa5cc36c52726108a0b67e2765", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html": [ + "9b89dea31adab1772bcdc6f3c8c9f9ce4e48fda7", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html": [ + "1720d3f976f30fb7c471b22bbd17fdf827ef7d82", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html": [ + "bdeeaf8890155d6f2c41945b068fc74f826efa55", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html": [ + "6403bfd19b98da857e958e750d8df1189cd90502", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [ + "f94b8510938b65fb37dc4ada11d26fe117e3189c", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [ + "ec892306fcca46ca1c433533268a7f1843196e20", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html": [ + "9f130968276fff10e02e60ee924fd789b0b0744a", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html": [ + "8d082df26aa41a9a7fe3a69a704b68a02a800be4", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html": [ + "548ac93454d120769c6672c61d7373641b8f2590", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html": [ + "d1cc093fa78ff40abedc818127dfdf349bf6ed3e", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + "0fbad23fdcecd4fd4797465a0ad1ff98193677e0", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + "3d5491077da55be6a9632eaf65ab76119544242b", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html": [ + "341b4c615772a1f1c6b2246535ac29984433ae26", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html": [ + "dd00c4fade29a00af8059fae55df18a49d8cf7b1", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ + "7769dcea80983ae046c81613d216289375d1816b", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [ + "a00865586146cc7b42d06747154b4573e336ab04", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [ + "ab71ab617be91bc742f551378cbfec75d03f608a", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [ + "d6bd4896d026da925904ab32b8663e266aed2955", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html": [ + "540f3afb192dfbe8cc85caea8d1106a732be1562", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html": [ + "ce6f0d71dc492dd057b595d3c4e9c1ff3793a8d9", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html": [ + "5e8a2026ae959303068a96cfd9f18fc189eb0888", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html": [ + "12ba6162053880f2aa8ccb38f9a2cef471ee857d", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html": [ + "df0834cdbb2acca1e6526ff587b50f766152d99f", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html": [ + "0c8c4cea9aa59fd67b2e12d792175db3d643686b", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [ + "37eb120c3e3ac9a0481154162a255099483415de", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [ + "362e249deb97000840974552c0b0960ca1854ec6", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/same-http.swap-origin.http.html": [ + "48ec25ab1133ecc26bf6d59765f687cb97975cf8", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/same-https.keep-origin.http.html": [ + "5073b173cc395e446fdc0f983e7c72fdf5839ae4", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/same-https.no-redirect.http.html": [ + "c3a0b2bf60ebe901cc503655174c8dc59f782efb", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/same-https.swap-origin.http.html": [ + "6c0f2499bd99905db43dd7a929763ef26bcc8b8d", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/a-tag/cross-http.no-redirect.http.html": [ + "7318a8c172d99927c5004a17620e6df6edfc283d", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/a-tag/cross-https.no-redirect.http.html": [ + "6cad3a733287f9f98b4f8ef8052b26a5a895eeb0", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/a-tag/same-http.no-redirect.http.html": [ + "535a65e06658bfb24f8dab3322cced57cecc48f1", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/a-tag/same-https.no-redirect.http.html": [ + "53fe7d7255b94512925cabfb02869cc6808df11f", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/fetch/cross-http.keep-origin.http.html": [ + "f8b1036543cd2bed0cadc3fb8bf22ef5b4cb77e5", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/fetch/cross-http.no-redirect.http.html": [ + "05b93c5defd21ce14c2cbc13cac6b77e4b3956a8", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/fetch/cross-http.swap-origin.http.html": [ + "e3f38f15bfef08da769a678dad327f0ce0de03b2", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/fetch/cross-https.keep-origin.http.html": [ + "00f0ad928958e7d4153b49ac8c3d334de55650c8", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/fetch/cross-https.no-redirect.http.html": [ + "53f7976e1a89ace20521192e275eee46106f3bfc", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/fetch/cross-https.swap-origin.http.html": [ + "d58826d2d1d84decb8900f9e460e90779c1b759b", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/fetch/same-http.keep-origin.http.html": [ + "87b4da86cdda53b39227e9313a94276aa9c0526f", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/fetch/same-http.no-redirect.http.html": [ + "b8d6662d987a69dfad9872e1f5b2ae064f7d7a5d", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/fetch/same-http.swap-origin.http.html": [ + "ca8ab3206d5f464eef1e767e178e46fb21a2307b", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/fetch/same-https.keep-origin.http.html": [ + "bf8621d9a0e4496bed434e5db52504fea1509cff", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/fetch/same-https.no-redirect.http.html": [ + "c02a0a97645339f3048e63d9231cc3f4cba46cb0", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/fetch/same-https.swap-origin.http.html": [ + "aa75c1d93e8b068d456e941df73ee7af1fe34327", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/iframe-tag/cross-http.keep-origin.http.html": [ + "8f36fba79b9a07a4622a1e6e5615c763fe4e0d2c", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/iframe-tag/cross-http.no-redirect.http.html": [ + "93c50925484c60a4854e3d49bf317b5dc860c2d2", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/iframe-tag/cross-http.swap-origin.http.html": [ + "3867056bc904c24ebd7ee2486f2f47927bf4a614", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/iframe-tag/cross-https.keep-origin.http.html": [ + "fc166adf7fbe2b047551a16c0fffefd0ab6ca67f", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/iframe-tag/cross-https.no-redirect.http.html": [ + "e9e6810500779a791eca0e2d81a279fb16119276", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/iframe-tag/cross-https.swap-origin.http.html": [ + "e76927a6eaa019156b0cb494649ac095b7d08187", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/iframe-tag/same-http.keep-origin.http.html": [ + "4f890fdc43c030e54d3cd6ca596d75cccb77a741", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/iframe-tag/same-http.no-redirect.http.html": [ + "5c9a5b9c64e081420328c4a3572c4d91a74883d8", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/iframe-tag/same-http.swap-origin.http.html": [ + "8064bb587f9db9e4e5bfddb16e2634e898d03507", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/iframe-tag/same-https.keep-origin.http.html": [ + "b412f948c8af517486c0459bef801621699249b7", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/iframe-tag/same-https.no-redirect.http.html": [ + "776157c1eeb3ee5b09f2735e08ffb0fe6fcdbbbd", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/iframe-tag/same-https.swap-origin.http.html": [ + "1b4bffe179c3fe1aef916cac6270e8df026a25b6", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/img-tag/cross-http.keep-origin.http.html": [ + "c05c94a575f518d40575419278fd39ae93584bc7", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/img-tag/cross-http.no-redirect.http.html": [ + "e10e633f8107a062c4a8451c9e60db68e7d7ab2c", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/img-tag/cross-http.swap-origin.http.html": [ + "392082662c9812e6ed9f484ea5cf234b6f6f9180", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/img-tag/cross-https.keep-origin.http.html": [ + "3b78af8c3e344b147bb75beb84b3c43e15e0ac5a", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/img-tag/cross-https.no-redirect.http.html": [ + "cfd1c4a12b17a2ddfac8a605c1ee6d8b6d0a6f7d", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/img-tag/cross-https.swap-origin.http.html": [ + "3596fbfb8e06b69667b8738e362ea57196d87553", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/img-tag/same-http.keep-origin.http.html": [ + "4c72cae89a65446536f560d3c856662a08aa6da2", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/img-tag/same-http.no-redirect.http.html": [ + "4c32a090d67812c1243b5c714ecd8a43f0c4c6a7", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/img-tag/same-http.swap-origin.http.html": [ + "32dea49c05b78fe0a5a31a35f5d34fc2cb09ac21", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/img-tag/same-https.keep-origin.http.html": [ + "09f99d03e4960e89163fb8500f65acea0efcb923", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/img-tag/same-https.no-redirect.http.html": [ + "e2897c8eb409213fe2d8c17870141375acdd46c8", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/img-tag/same-https.swap-origin.http.html": [ + "8090a0734718a160890f6c303e51459765ef6cb0", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/script-tag/cross-http.keep-origin.http.html": [ + "c9e1737be9cddce0b4e8cc26cb92866162be4f4a", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/script-tag/cross-http.no-redirect.http.html": [ + "0fe9c8b3dda58cf0941d6710be8e8672c3fde334", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/script-tag/cross-http.swap-origin.http.html": [ + "e447ce0cbd432dccc15a9e7b346bc1844313b624", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/script-tag/cross-https.keep-origin.http.html": [ + "a626eee923bcfd3af4bb3b88781483c5b7aac9a3", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/script-tag/cross-https.no-redirect.http.html": [ + "c22dbde1b7a0f727a0c346c3eb1108aafc8986b7", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/script-tag/cross-https.swap-origin.http.html": [ + "f08308c22c6c0085528fcac9d3e1e48513861971", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/script-tag/same-http.keep-origin.http.html": [ + "a881e761525190c99b1fb4739eaac24070ace7db", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/script-tag/same-http.no-redirect.http.html": [ + "6cbd35370e347d5b78937341785dd9b027fc2e33", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/script-tag/same-http.swap-origin.http.html": [ + "84a1d142e91b2a5f4411ac5529c0ea8dfcb1b501", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/script-tag/same-https.keep-origin.http.html": [ + "328a098736e0bc6639e7eac0a5fb5abbaf9c9aff", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/script-tag/same-https.no-redirect.http.html": [ + "af30e7293d3511518093666a534331db3d03bdef", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/script-tag/same-https.swap-origin.http.html": [ + "71e9e368820411a0645907736b9738d853c913ad", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/sharedworker-classic/same-http.keep-origin.http.html": [ + "d8b7bb2c08bc19031891b8666abc6a6be7e27b1a", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/sharedworker-classic/same-http.no-redirect.http.html": [ + "93a99944fa7e0d371cffbd5660945a7e4a0596c4", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/sharedworker-module/same-http.keep-origin.http.html": [ + "8ec75fcf7134647ba2b7dc51b67590fa23a320ef", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/sharedworker-module/same-http.no-redirect.http.html": [ + "8e025cab9e72677b9215b9fd0054a8581d2cf4dd", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/worker-classic/same-http.keep-origin.http.html": [ + "6fc3185b52009feda74e75b35825d85561d67454", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/worker-classic/same-http.no-redirect.http.html": [ + "51dbf587a8f1a4906590fd44d93c8fd948d6280f", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/worker-module/same-http.keep-origin.http.html": [ + "6e466bbfa1cc7dc51f64671903ab736952ea7903", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/worker-module/same-http.no-redirect.http.html": [ + "11a507ad102b50df56ac2bce9ab0b419c9d60705", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/xhr/cross-http.keep-origin.http.html": [ + "f427c38683a2422867a66218bc58a869656d1cff", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/xhr/cross-http.no-redirect.http.html": [ + "9d806833d533bff57dc442f3ef2832adcd237ac6", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/xhr/cross-http.swap-origin.http.html": [ + "456cb860b21fd211d1a31c29dc096ba1c2731c7e", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/xhr/cross-https.keep-origin.http.html": [ + "c1e15664003e6bdc665832d2ab050f69d33ac78a", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/xhr/cross-https.no-redirect.http.html": [ + "399363aaadb6a4f963cda7873c18b50999898223", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/xhr/cross-https.swap-origin.http.html": [ + "ee98ddee55b8f9e0e8ecb446c19d2e24849d30e0", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/xhr/same-http.keep-origin.http.html": [ + "b738f7704f28a5791976669ac55abdf45470843b", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/xhr/same-http.no-redirect.http.html": [ + "2268a7ca7c7aa1854016302e8e9863488dff3be9", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/xhr/same-http.swap-origin.http.html": [ + "ccc6d139bdb5a4a4af8d8a910045a561662d9acc", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/xhr/same-https.keep-origin.http.html": [ + "9ed89f4105d82b72d27b38147ef330c3c02e79db", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/xhr/same-https.no-redirect.http.html": [ + "76ff6d82db6bd46b9427ac7a0c28a9e95392935b", + "testharness" + ], + "referrer-policy/gen/iframe.meta/origin/xhr/same-https.swap-origin.http.html": [ + "3d21f61daff0048d5b6b913c7849c335baca1d1d", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/a-tag/cross-http.no-redirect.http.html": [ + "b30ebd803bbab2ed6b3cfe4cbc0c2a8d7707e12d", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/a-tag/cross-https.no-redirect.http.html": [ + "b6692d3b463ca1d3d7401fb5ece306a8cb4de471", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/a-tag/same-http.no-redirect.http.html": [ + "03c4e2c7296910135da5d7b3fd0bf2b0cf5e14bf", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/fetch/cross-http.keep-origin.http.html": [ + "07f14cc13f5e8a1d3160801576b2b5326b4415d6", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/fetch/cross-http.no-redirect.http.html": [ + "4db8473b114c21b786421c442b48040b926c3f7e", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/fetch/cross-http.swap-origin.http.html": [ + "9af0de43e46184d2e400af9c2caff55a7f162856", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/fetch/cross-https.keep-origin.http.html": [ + "95c5594d06784e2c596f73609cf11b86bec713b0", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/fetch/cross-https.no-redirect.http.html": [ + "774e9471fa878b0bf1540ea121556880a2624cf1", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/fetch/cross-https.swap-origin.http.html": [ + "32ed6546e9b09176f4300f7d23be2c2fc98ee4e0", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/fetch/same-http.keep-origin.http.html": [ + "5df37157716936941fc84781eb13957bd8fd6b26", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/fetch/same-http.no-redirect.http.html": [ + "854b1f1561f9c08b719bf5040b1b72ca5a5905b2", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/fetch/same-http.swap-origin.http.html": [ + "8fedf4bacb96f42b9d3610316809f6e324d780b0", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/fetch/same-https.swap-origin.http.html": [ + "0696fe607cd2d885338927b426ed22cad65c4ae4", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/iframe-tag/cross-http.keep-origin.http.html": [ + "78f8d75a14e3549606904081513bb20d24f4c445", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/iframe-tag/cross-http.no-redirect.http.html": [ + "fcdd23a62e52f3accfef49dddb0a7c33b475fcb0", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/iframe-tag/cross-http.swap-origin.http.html": [ + "f883c2155624434a34486c0617fc7a6c0af18822", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/iframe-tag/cross-https.keep-origin.http.html": [ + "ba2ca61187d16d25b3e66be24c209d02d48ba7e0", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/iframe-tag/cross-https.no-redirect.http.html": [ + "b8457426af5e68fadb0c0ba072e332396d911810", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/iframe-tag/cross-https.swap-origin.http.html": [ + "3cdc766b82991de01fa9c8c3bfcff1715ef530bc", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/iframe-tag/same-http.keep-origin.http.html": [ + "3a301f19714b966c0f09a4be6004d1cf45c92371", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/iframe-tag/same-http.no-redirect.http.html": [ + "4ebc2e021f02321014cecebd523773dd7ff1179a", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/iframe-tag/same-http.swap-origin.http.html": [ + "ba93a87c1e65b81c705d3ea8d479b1d1b7e5f4e5", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/iframe-tag/same-https.swap-origin.http.html": [ + "8669837c19355387e34812e4cd0ff3314c215bbb", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/img-tag/cross-http.keep-origin.http.html": [ + "403b613da172390ea4265be698eaa4f98882940f", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/img-tag/cross-http.no-redirect.http.html": [ + "5a7381757457e27b0115140d6b04e4303c3bf6c6", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/img-tag/cross-http.swap-origin.http.html": [ + "c99f5161bfda253ba7c16129dae4574ccfd9ee4e", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/img-tag/cross-https.keep-origin.http.html": [ + "2a15d61d6a42a4e5bb88b022b5c3275ab9952315", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/img-tag/cross-https.no-redirect.http.html": [ + "6c7ef53b60a8f82a801ed8d4d2d6399be6212a2d", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/img-tag/cross-https.swap-origin.http.html": [ + "54135c8337e66888111cc3597bc221372de7c6ce", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/img-tag/same-http.keep-origin.http.html": [ + "e0024793714c4b64062226546f9eb55ea01cea67", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/img-tag/same-http.no-redirect.http.html": [ + "fdd6b94a4d19b0bd9aba99f7fb76dd06e9eb398e", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/img-tag/same-http.swap-origin.http.html": [ + "19c103f3c564f6e38ad8d08ea55fc1d18d973c84", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/img-tag/same-https.swap-origin.http.html": [ + "935cbd4403de73750cc3436211e983b3c074d96e", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/script-tag/cross-http.keep-origin.http.html": [ + "5f4b2309cf2dac89b5d9545b57212ce06020cba9", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/script-tag/cross-http.no-redirect.http.html": [ + "a1129cafc76a27c7d016f150fb8669ae5584944b", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/script-tag/cross-http.swap-origin.http.html": [ + "b8a2578a14bd7f09d75c37fd5648dac41961676d", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/script-tag/cross-https.keep-origin.http.html": [ + "73c7f2fbee1dc54e637da1f8cc95a8d9f2c09bf6", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/script-tag/cross-https.no-redirect.http.html": [ + "f6704def12bce65a2719d2b1b5d57dc718263ceb", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/script-tag/cross-https.swap-origin.http.html": [ + "cb70deec6c35d853b2a7dea41d0743b07945a579", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/script-tag/same-http.keep-origin.http.html": [ + "96aed6e6fbb55e09566c4714ee2f360991a6086a", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/script-tag/same-http.no-redirect.http.html": [ + "a27f9fd0ae0217446793a9dadea994e18d30ae3e", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/script-tag/same-http.swap-origin.http.html": [ + "42362420650290b4035e4fe63c7e17d5ebfdddc6", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/script-tag/same-https.swap-origin.http.html": [ + "fbe418dcffbbc23910017956cab103d0c7696fb1", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + "3578b8d1d6a50b2708c893f35d8e9cad64ed1074", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + "4b249fa4a68705f520b42815c777969ad46d847d", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/sharedworker-module/same-http.keep-origin.http.html": [ + "faefe995a577a01138990a3da75756ac3ab936bf", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/sharedworker-module/same-http.no-redirect.http.html": [ + "b923af98945c4372516d38333941d1a7f2a5ac70", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/worker-classic/same-http.keep-origin.http.html": [ + "d81372241fb14aa98f7d03c02e8b9b51b9cb708e", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/worker-classic/same-http.no-redirect.http.html": [ + "5262ced797fccf96e2c21d8126f630422660211a", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/worker-module/same-http.keep-origin.http.html": [ + "ba305dfd4fe671f103f50f241966b558a1f95ba1", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/worker-module/same-http.no-redirect.http.html": [ + "50075471ab61b692985c41065764445965727028", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/xhr/cross-http.keep-origin.http.html": [ + "d0b5e42b8ec9bec74544fccf9aca1a20ad9defe4", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/xhr/cross-http.no-redirect.http.html": [ + "6fbb11f96d97dcee1f2a4daf84de47d0f0ae8d6d", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/xhr/cross-http.swap-origin.http.html": [ + "df2c2a05bc4f1761fb5d0104b0ec9f3cbe6f9014", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/xhr/cross-https.keep-origin.http.html": [ + "86eeca95a9dfc1762ae4b07ada0bc426f063145d", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/xhr/cross-https.no-redirect.http.html": [ + "095f686a8830b1a7440b67c15eaf542c13c54329", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/xhr/cross-https.swap-origin.http.html": [ + "cd2e1107ffd31e681e1bd3a96b6b210d72892740", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/xhr/same-http.keep-origin.http.html": [ + "a8eadbae30376a94e18a2f5e716d42e0f4edd300", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/xhr/same-http.no-redirect.http.html": [ + "3baa644f3f9de7bd922d84f6ade825fcd5d5f06d", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/xhr/same-http.swap-origin.http.html": [ + "e49f5ff7663b7790a1d4c18e74aeecdaabac8dc7", + "testharness" + ], + "referrer-policy/gen/iframe.meta/same-origin/xhr/same-https.swap-origin.http.html": [ + "530b3b042b318813794be88d837bf75fe136d79e", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html": [ + "d5d5243061972c2bf2fb9e7b18ae6d9498da9004", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html": [ + "947f570fd2c249e68f5adeab1833482ce13a8a4e", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html": [ + "ae7fe3573b20ca0b82d4c77d8540ec3627aa1dab", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/a-tag/same-https.no-redirect.http.html": [ + "31390261ec152dc5a1d9a75fdaa1650befd25537", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html": [ + "d8d03381c14061547ed0f9a0e34d7c42ae109b1c", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html": [ + "7b2de467b99d68766551c32ac76b63bc30854c6c", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html": [ + "7b3634e0de5d79d9e47b8c886c8822249546aafd", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html": [ + "a78a08341effff9d8de861b6d15945320894b151", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html": [ + "e74bc959d4c3bd1efc0c9a4e95b366eb45845f74", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html": [ + "24e5b477267e9b4629ded80b168332317fba76bd", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [ + "ef57a2c2dd718a5cb9d75a2e2a04165cd2eba1e7", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [ + "3d6844bb544082186a9f3e4d1c4bbcab9c2c462b", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html": [ + "1ac65e2099401b6c46ff8779c7878240495c0ad8", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html": [ + "58a706ecb29602144db7e129203abc8ebc857956", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html": [ + "72ccbc4383b703c88ebd834aa3d0d6cc2eb7e3fe", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html": [ + "f1dcdffaec6c568c14726e7692438ef4931f4434", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html": [ + "d59d219f55ae2087a51ad8fcd99faa1b305f2cfc", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html": [ + "14ae1c210d23897ed054997b62dcca3b1dd6f2ad", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html": [ + "57e2a49de54a2856bc5354393124b667d8d9972b", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html": [ + "a4a51b3efc2c26654659372099baa65d59478678", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html": [ + "4deda538071e6ec19cf3973aad41733155431df2", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html": [ + "4745f3e069efcb384d6fd2d42fe2c39492577fec", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [ + "b2c34f667d9558c629d92082963d33357f586bbe", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [ + "23c3f48f72a28670e840a02b8c5c6e1ff98e0dbd", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html": [ + "0e0d1c518970f3cc5c75bce7b808126b98b401be", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html": [ + "1f08eca0ec8c658886632e4b9d50685348d3e7de", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html": [ + "e09d23ceea4a85cb1f7f5ba95b35d628831dd912", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html": [ + "bbc2a62f62bba5b7293d3e38c5393078e27566e0", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html": [ + "cbaa18ac758d5eb8b1390809130795c33ec9a8c4", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html": [ + "b06734ef480c1f50e5b62681df9008770956bad8", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html": [ + "ee85115cae65e9d3b2845e6f6a39de300dddc00c", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html": [ + "d302bfdd57373e6435119cb00082ae0525a39372", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html": [ + "f4c992741e0d4d47cfca6bd4402c4ad9efea8552", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html": [ + "bc5cf5d2503e5c50f30714fd0f31a0ca48c8d0eb", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html": [ + "4719a5e4cb8106ccc22a28d450c625ffe66f94ff", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html": [ + "591edb3e0f4ed5f992d03cd3f6fd2e98028e3797", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html": [ + "8571e12f9dcf30f0f387894e2f35d4dbe50228e0", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html": [ + "5a72a055a5cd73ce048c7ded8f6b7507fccd5796", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html": [ + "b561822d2dbc8d68027ac5e32c61d3d318a65c13", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html": [ + "52fbad74221a6dca4f2f798946c32709af91bd1f", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html": [ + "c953780877a32a0f948a94ab31b43392df49d670", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html": [ + "251ef6bf9ab6a2f6c87bec91b2151c77954c28ab", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html": [ + "5969f8e0ef0ef01b60ed240ace6c07b81aaa73a3", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html": [ + "3f739124c9bc5443f741d84b18f3dcc381fd2450", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html": [ + "5f78af353942bf67855f1c085685625677662d89", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html": [ + "f6b4ec0034ba45716455d79221312ec512435090", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [ + "920d9edac9d7ff8f82c19f42c51b8bb8d7704f6f", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [ + "5f11050aad85521ac5ef49f41e4052692f330e6d", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html": [ + "d27d31c4ffbc300403e2db8ba65f13400be0d5ce", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html": [ + "6ecaaec290705110dd6d97dbd829e3a1145c5020", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html": [ + "061f280156e98759674ac80f6cf4ba976f42b4fc", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html": [ + "6eebcac67ca760eee2386d7fc3d903a72c2ed67c", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + "5e6fd0e58fafe344ebbfba514d51b16009b42a22", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + "fe068b72609447e7ef9a6b962dda40b9720b5b44", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html": [ + "100b0aff0d3cf2db6b1fa203baffcb2e8ac8d095", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html": [ + "fa87a96d73cd85b58f2f4e268830ac4524209603", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ + "455d8dd56dddf5135e17230b462ec12f0549edd7", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [ + "cca1d04da700ef1abcfe4f3542f217f186f89f00", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [ + "a90a3d448b6e215af180977427420c4febae5f23", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [ + "36b0dbeb47beeab1a58d5bd54a99e16a7c2d7a39", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html": [ + "1ef3bed37176fb68cfaf9f3fb771b3bc9b869a84", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html": [ + "5efa06b53809eb4a12f1859cb4c6a07983bb6780", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html": [ + "56be17b180b3c2ee4f5a2983d184bcd526eae547", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html": [ + "9671f4cec58f4046409677a00c25b44ad80c0eab", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html": [ + "4dbd8d36626ec85d013db7fb023d8b0c3522d802", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html": [ + "fcf739f97db08080d7cae0b69f96a28b0a581e48", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [ + "e7eb46e8bad11a0a14edbdb2a89f7c454c883974", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [ + "57c90d61b34a1b7432fb1d3177599506827b63dd", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html": [ + "b74ba1ab8859d730ac9506cd2b49e4539fdbf064", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html": [ + "0b3950131b1e0e91976a38c201df5a75f8ec5cc5", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html": [ + "ac7abe7c645f64610740dd20aceed7cd11bc52a5", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html": [ + "e2987d450f9edbcc4addb605db05c34230c3e542", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/a-tag/cross-http.no-redirect.http.html": [ + "699a2c54f51133bf04dc6a153964a6e8e2f0a534", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/a-tag/cross-https.no-redirect.http.html": [ + "7e6163bbc1cecad31e52dbee14d08bf7604501b5", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/a-tag/same-http.no-redirect.http.html": [ + "83e0b1e6edfb3763ac86f0fc02aa85a3f2a2f5d1", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/a-tag/same-https.no-redirect.http.html": [ + "0ddfbd1ac6d1af11e2d05dcd7d1ea05e7a700ad8", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-http.keep-origin.http.html": [ + "abf83604b0032f3b19e45c8571927bc64809b8d8", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-http.no-redirect.http.html": [ + "1b6d9c90e12d7f2a0b9c81382a36f9a83ef01e9c", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-http.swap-origin.http.html": [ + "a50f26f78e2aa93ca46b7d77a6109e6f03f30435", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-https.keep-origin.http.html": [ + "1f303a20fdc77191eae9568c132dedd6cf1ee869", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-https.no-redirect.http.html": [ + "1096573b9cbb990762fff8c0b0e915e7bae9b1e7", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-https.swap-origin.http.html": [ + "830358f4d8ce35a54a9481467e1b3920f63a9efb", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/fetch/same-http.keep-origin.http.html": [ + "c0515bea40dfabfd22766de2cd759b55f1439a2e", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/fetch/same-http.no-redirect.http.html": [ + "e567d69eeeaafaefff4cf5d74565b743d1c9e92b", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/fetch/same-http.swap-origin.http.html": [ + "be2f73135a5c98e813fa8635ec339aa37dc64e91", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/fetch/same-https.keep-origin.http.html": [ + "6432bc2abc19971e89a8e803e97cb3bcace1d7d6", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/fetch/same-https.no-redirect.http.html": [ + "ae8cd82670606803ef7f7bd1fc6b742030acb671", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/fetch/same-https.swap-origin.http.html": [ + "797fdafc794e835053483fc198d29d3b483eca60", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/cross-http.keep-origin.http.html": [ + "e67750d113de59575496232428a4602a9e99382f", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/cross-http.no-redirect.http.html": [ + "01ae2a4ee98d2e8a238e192684d9f8ce28d2bead", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/cross-http.swap-origin.http.html": [ + "2158fa58c1c0e25797ed05833c927597bc5fd8a5", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/cross-https.keep-origin.http.html": [ + "d48c794b2ce364219a2a72dd7a4d40b6a5f51f4e", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/cross-https.no-redirect.http.html": [ + "8afa4b5d8585c12fada68343e3447f4ea8d2badc", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/cross-https.swap-origin.http.html": [ + "8202ab211341d3bbe766b1e427f6b0ee66588c9e", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/same-http.keep-origin.http.html": [ + "ba492c1973a60d367406e10bdc381960da1987b0", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/same-http.no-redirect.http.html": [ + "c3cdcc3c0b85af63a54f8bf634e38fba5a55330e", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/same-http.swap-origin.http.html": [ + "8013e1cd7231f373679a419ef64ebeabfc9ded48", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/same-https.keep-origin.http.html": [ + "a66ca5086c7704d2f9c761200e5c92eeb0286078", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/same-https.no-redirect.http.html": [ + "e7f3e88ab788247958601699873fd5c9d846bb22", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/same-https.swap-origin.http.html": [ + "e300dcb9be8f5fe5f873ad24705ffac13b85d417", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-http.keep-origin.http.html": [ + "d0cf5fe43e675e6e9e87b888bd4443f501a94d64", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-http.no-redirect.http.html": [ + "1e9873591b2f4d6a4a923fc2c625c95a7d2ef92f", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-http.swap-origin.http.html": [ + "6bbb93732ce84a20bd1289da79e5c0d137affb39", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-https.keep-origin.http.html": [ + "e1154425983ee3b87027e6cc5c0159f38e56b49d", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-https.no-redirect.http.html": [ + "cc5f917bc562b85dff8b090e26b24889acdf0b66", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-https.swap-origin.http.html": [ + "4c569b64571abfc3f5e7103efc506f1e673e033c", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-http.keep-origin.http.html": [ + "fd81645871dd2e0e6dfd64a665f8860fb46ebe25", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-http.no-redirect.http.html": [ + "74cec03ac97a18d8c723f86bd4e73845a1773eb2", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-http.swap-origin.http.html": [ + "f09bc5f32a919217e109e063f3f1f6828e78a1aa", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-https.keep-origin.http.html": [ + "9e3a7efaca43f4daea9422e433dead01787d5ca4", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-https.no-redirect.http.html": [ + "642b62a8e51f1f620e99162f6d3d47d065eeb757", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-https.swap-origin.http.html": [ + "04ecc894f5b6f7eebe5d6e8601e1b8aecf1ae048", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/script-tag/cross-http.keep-origin.http.html": [ + "ad1b4ef8fcecd21c13992487fc47affb73481292", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/script-tag/cross-http.no-redirect.http.html": [ + "25371e6b66e15e7b1ab8f20feb9e11bfcc4f6992", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/script-tag/cross-http.swap-origin.http.html": [ + "79f9876cce71329f472a750a9bdafa6c057dfb5a", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/script-tag/cross-https.keep-origin.http.html": [ + "2fe52eb86799eca8a24aa51f63ab3479d6dc3ccd", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/script-tag/cross-https.no-redirect.http.html": [ + "71824e825843e3486d42c338f4ef7f06bdf52b54", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/script-tag/cross-https.swap-origin.http.html": [ + "c5759134a4d4c5ed82b2ca56d1404cb76c5cb828", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/script-tag/same-http.keep-origin.http.html": [ + "7837973d05bd3f59ff5cd27a62a0b5bcad1b1322", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/script-tag/same-http.no-redirect.http.html": [ + "e4e4784ad84961f7442b900c206d20b1e56c08c7", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/script-tag/same-http.swap-origin.http.html": [ + "08dd0040b3567b50c4cc80dfd38a1582a7a4b50f", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/script-tag/same-https.keep-origin.http.html": [ + "777c51474d287523445df42b59b0344e1bd9db53", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/script-tag/same-https.no-redirect.http.html": [ + "05271dff40f0f887351c0b8c83ffd0434540524f", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/script-tag/same-https.swap-origin.http.html": [ + "4b092cf5a015be2c243c15dfb14a949feec0f37f", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + "0ab21e58cb9e4ddb724a4050a217b67c732b9f2d", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + "3f6116a7581ad44539116a0d1e88647a6bbfb391", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/sharedworker-module/same-http.keep-origin.http.html": [ + "ccef018639a72a2bc44f89c8ccfbc865a752ef76", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/sharedworker-module/same-http.no-redirect.http.html": [ + "e6d90a6d5c91bc1194eb4b1a404d856730cbb0bb", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/worker-classic/same-http.keep-origin.http.html": [ + "9a03c41b08664873e8e05ecaa0cc7d8e8f07ba72", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/worker-classic/same-http.no-redirect.http.html": [ + "615be32dc92271d1bbb1de2e62eecd385e75a42a", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/worker-module/same-http.keep-origin.http.html": [ + "738e4e65ffc05760bb57bc135cf596b1aa50ce58", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/worker-module/same-http.no-redirect.http.html": [ + "faaeb0ca2d448b592fd3e975323d3f22db7ceaff", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/xhr/cross-http.keep-origin.http.html": [ + "c29f31a4967bb091f207153adb2c2eb2cb95c8f2", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/xhr/cross-http.no-redirect.http.html": [ + "3b591717411ed24e7a5a867fe85a62d22aa764ce", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/xhr/cross-http.swap-origin.http.html": [ + "f72939c7bc0e910b53bd0b72abdafff780d82862", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/xhr/cross-https.keep-origin.http.html": [ + "1378d7b72690f95ef8123e686ceeb78eadf740f9", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/xhr/cross-https.no-redirect.http.html": [ + "054f107b0cbf3a51d743daae9c6cbd144aab651c", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/xhr/cross-https.swap-origin.http.html": [ + "bb376a7edf47b5b27ad9e79495201dd2ef9ea88a", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/xhr/same-http.keep-origin.http.html": [ + "537781bc09ed9fd3fb8a52456c60475732e6aac4", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/xhr/same-http.no-redirect.http.html": [ + "43ba59d840d4c13ed1300ece1de2c3c2185ae28f", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/xhr/same-http.swap-origin.http.html": [ + "2aa63232beaa9b35833da07c96c3be63daeab1fa", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/xhr/same-https.keep-origin.http.html": [ + "eaaa51d0047db8381609505f5a2aee8e060bf43f", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/xhr/same-https.no-redirect.http.html": [ + "41b8b823fa57e168923a219af6ac5df03f54686f", + "testharness" + ], + "referrer-policy/gen/iframe.meta/strict-origin/xhr/same-https.swap-origin.http.html": [ + "4373d591b54e04ff8bf9d132f0ad3a15c9688a60", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/a-tag/cross-http.no-redirect.http.html": [ + "46594fa5459b9d55f3b212866ef6460911586b73", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/a-tag/cross-https.no-redirect.http.html": [ + "7a8df88c9fba30a1824837d9081a90678ce7aa8f", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/a-tag/same-http.no-redirect.http.html": [ + "4a810431fb27aff7b0fb6862ecd00a610a47c1e5", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/a-tag/same-https.no-redirect.http.html": [ + "e9e24909951c75058f25031ae587505d133a30a1", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-http.keep-origin.http.html": [ + "3c6508eb4aa26dbea98c233c8e01c03c74562150", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-http.no-redirect.http.html": [ + "c4d05b082e097453b3331e1064f6eea84b42ebf1", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-http.swap-origin.http.html": [ + "5200005a8a649dd699fd66dc43bb6ba557d3de49", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-https.keep-origin.http.html": [ + "83fe863bb9b8643b94d470f961346218a44858b0", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-https.no-redirect.http.html": [ + "c3035b8402a8b11c8a97e583558b73c87c5c1205", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-https.swap-origin.http.html": [ + "d541f04293b73b9aeb074f4e31c8a6424122f33f", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-http.keep-origin.http.html": [ + "8882d4575b669de9994e2f870775d3e5c4e971c5", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-http.no-redirect.http.html": [ + "2b7bedc21b58ae13d6e830f27f32e113b471e9b0", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-http.swap-origin.http.html": [ + "a2c27ebef7ac98445fb63fc8fb485e144d603e70", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-https.keep-origin.http.html": [ + "5d96b677cb175167cab7d236e3aa2c656636d426", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-https.no-redirect.http.html": [ + "c8299202bac01387be8dba7e053dd839c0031364", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-https.swap-origin.http.html": [ + "d95e31ea2b2049c0c9e951a1d0c88377692a16fe", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html": [ + "75206d3a12cc91741f2017410b4f4f213c2bc3fc", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html": [ + "e7b0d052437eb473f65aa99da01512bcc499a8ae", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html": [ + "d2805e63b56d7cd656cb4f236d457d86dfb79f2b", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html": [ + "c096c737e2972adead54d4fbf8b60ee25f96aa34", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html": [ + "385538433c2d9a95ae28b34306611940ab735040", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html": [ + "21b9125cc5ab442215c8b0a48071f3a139fbf5a9", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html": [ + "e85b4a99ef3a22a27469b2b71ad9741a5279da35", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html": [ + "5818638e664173f246ad4f6772cba58fe858b0fb", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html": [ + "378736f7b49c3bb998bf18d7ec9366e39279616a", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html": [ + "dfef86f6c60bfc80ee358fb1e6df1489a775f2c4", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html": [ + "6e6b17b3a47874c4a981a4aef7ed6c623b381d61", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html": [ + "1272dbabe339267bd6cab573a24d190caa1aa8c4", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-http.keep-origin.http.html": [ + "57d7dfdd63de54031fc5490495741762b63a57b8", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-http.no-redirect.http.html": [ + "1cdec8bef3ec868c38d9e6e15c8ab47535d4a3e7", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-http.swap-origin.http.html": [ + "ed0f7c1ac496002472c371939d793e0e25e89ef7", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-https.keep-origin.http.html": [ + "486b3d1eedee2da75ed1d123eb4b6cb4cefed44f", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-https.no-redirect.http.html": [ + "9006c3154b443278803fa128d5479d3ecf39dab9", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-https.swap-origin.http.html": [ + "ffb9250c11622f335699ed58bcf0b51b6713ab1d", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-http.keep-origin.http.html": [ + "9dd3bdc8e57ce0e04971f06ccc50c61072b672e6", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-http.no-redirect.http.html": [ + "747f51eff1d14c229ad5a08c8713381d22153adf", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-http.swap-origin.http.html": [ + "88225657563050493c8456e57fa9081c588bf98c", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-https.keep-origin.http.html": [ + "97d7687d51ea401f2f8d365b99e7b0d147a58fa9", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-https.no-redirect.http.html": [ + "4ca7c83001e8383bebbd7a8fbe14e250db8bba6f", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-https.swap-origin.http.html": [ + "e9602ab4f17a8decfce0334b9f91ab7c6aa0dd87", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html": [ + "c0803c3a12fcb5ed9d85785de4f42b1b15ddcc35", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html": [ + "8d9da54cbdd8e79f4e14a62c0c34934eea341da2", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html": [ + "2a3cf647eec49a93c52c92e4d5f835ac5ea2e056", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html": [ + "27996587590386ae791439568b23ca69c0dd90f1", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html": [ + "88380ab5b1141c58290d7636882ae7459aa605f2", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html": [ + "2846297142ad8888ba0f044d3762962933090caf", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/script-tag/same-http.keep-origin.http.html": [ + "901dffc26c0e4e406e068496d274bd1b96b28eeb", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/script-tag/same-http.no-redirect.http.html": [ + "2bfb465bdd1cbf185a5cd0fe66556cc986c7edf3", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/script-tag/same-http.swap-origin.http.html": [ + "5ba39d1da694f7fa2c8cae282188697d51c527d2", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/script-tag/same-https.keep-origin.http.html": [ + "0d3f54153e56628abffe6a265c590e3db1e2175d", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/script-tag/same-https.no-redirect.http.html": [ + "e47219b04ac4f3f6bf5a43c5b45c1acac1fad338", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/script-tag/same-https.swap-origin.http.html": [ + "326b4e533d3c4c2d5a5e5eb377ddbdbbf466e3f9", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html": [ + "dfde04b0bda0806c72aa3a0757743c2650e0e773", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html": [ + "e56886b03e3014fc563112141d834829b88b2c43", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/sharedworker-module/same-http.keep-origin.http.html": [ + "b2b3e533251c42253632aec5f39076b137720833", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/sharedworker-module/same-http.no-redirect.http.html": [ + "6473f9456d14e824125868f2dbb9063783f33291", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html": [ + "b433a34b5f8ba85f0804a92e9e09013e2e8ffcd5", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html": [ + "f5055a6ab7ab71e7919eaabf13c4b7471d38d5b1", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/worker-module/same-http.keep-origin.http.html": [ + "18150e929868e2161038fa88b605cbca7ea12212", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/worker-module/same-http.no-redirect.http.html": [ + "775870de31e7fe6a5455405def15c9b6ec21d993", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/xhr/cross-http.keep-origin.http.html": [ + "e4cc56e9e822245681a42c4754b3e70a2d22ba7a", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/xhr/cross-http.no-redirect.http.html": [ + "424299d18714200da954c864d3c3d45227bb0948", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/xhr/cross-http.swap-origin.http.html": [ + "a6620d674f4d1f016f08ef78f3c535bc0a4225dd", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/xhr/cross-https.keep-origin.http.html": [ + "2adc36d4f67fa92ba969a350ee4ebea8a9d9dbfe", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/xhr/cross-https.no-redirect.http.html": [ + "dc3eb219b34743b98f1cb19e9584bbef927e2a84", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/xhr/cross-https.swap-origin.http.html": [ + "631c3d485821fad006fee3870960f13f49d8309b", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/xhr/same-http.keep-origin.http.html": [ + "68f9f937237bb901923a175a6ad5901b9a914211", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/xhr/same-http.no-redirect.http.html": [ + "dc5706b1d49bfb3a021d94e6b91b4a5dd03e31a4", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/xhr/same-http.swap-origin.http.html": [ + "77b0f0af6d2cf03ebe3ab7ff29332ca1a3a5bcdf", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/xhr/same-https.keep-origin.http.html": [ + "9cbab96947677b6c27c7ceebc15d2525326c6b8f", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/xhr/same-https.no-redirect.http.html": [ + "41b15d0d5e83ca9bb5c4850de587437d70d0ba6a", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unsafe-url/xhr/same-https.swap-origin.http.html": [ + "a0e9d13c8c30211ac983759de80322f9fdf2c5c1", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/a-tag/cross-http.no-redirect.http.html": [ + "b356da1e8e0fc200c0abc587d9976d46937ad8bc", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/a-tag/cross-https.no-redirect.http.html": [ + "d4553125f7f68921ff3f701b18e3742d8a6ed717", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/a-tag/same-http.no-redirect.http.html": [ + "42deca6f5295177c441d302c034266fd98f2b9ba", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/a-tag/same-https.no-redirect.http.html": [ + "783a286b7d76a49455468a95c5d1e2c132d037ad", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/fetch/cross-http.keep-origin.http.html": [ + "e096fde69be75e55c8de9c1e9e6d0d74548b8fc3", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/fetch/cross-http.no-redirect.http.html": [ + "01ff5fdf718ddc7c1b1a1df1dd3fca5a570ca36b", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/fetch/cross-http.swap-origin.http.html": [ + "c4d1442990e68f85b122e86bc4bdd8624e7619db", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/fetch/cross-https.keep-origin.http.html": [ + "8967fc788187523c08de14251f979e2bac16e684", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/fetch/cross-https.no-redirect.http.html": [ + "b08192baf1e23d7f3150883828607e137ec0b973", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/fetch/cross-https.swap-origin.http.html": [ + "171d908525c00195d1cc48a1b3dc855f0c8eb4ea", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/fetch/same-http.keep-origin.http.html": [ + "d06af26170b076925f308602e7af0e38825905f6", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/fetch/same-http.no-redirect.http.html": [ + "4ec30ea3a03162200934bbe48e0a17bdc9a3db48", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/fetch/same-http.swap-origin.http.html": [ + "1a6478b206d05887ecc85f63801d2e9c0bbb7d0e", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/fetch/same-https.keep-origin.http.html": [ + "0b07b0264b1d1ed71cfbc1b12493abbbb940cb23", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/fetch/same-https.no-redirect.http.html": [ + "5487c960fc6a0d5a6fae3584bc429316a1e2af52", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/fetch/same-https.swap-origin.http.html": [ + "0cf4d2c0e06e53d721bcc01f5e1029ce3a89fa60", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/iframe-tag/cross-http.keep-origin.http.html": [ + "c28f300af23869410f416216937dab3beed9fdff", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/iframe-tag/cross-http.no-redirect.http.html": [ + "e04e1b902b139de73121d4c00199a0627b0c552e", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/iframe-tag/cross-http.swap-origin.http.html": [ + "70dee43e15888cdb465f3249201084f01b57bce9", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/iframe-tag/cross-https.keep-origin.http.html": [ + "6e45e08e90d889a076d7536af9d02364691b13cb", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/iframe-tag/cross-https.no-redirect.http.html": [ + "9fcca116c4f332c04faa4a122b11620fcaa41def", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/iframe-tag/cross-https.swap-origin.http.html": [ + "c2025cbcf5ee7a1a66b50e49ee569b9a31d85269", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/iframe-tag/same-http.keep-origin.http.html": [ + "81403d6921c49fb21ece452578b80b70276c1bb2", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/iframe-tag/same-http.no-redirect.http.html": [ + "e502e90e6e1a20a862c316d2b02e060b1cba9cb6", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/iframe-tag/same-http.swap-origin.http.html": [ + "b1aef2bf4c702fc0da5f71aee345fc113b6d2af4", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/iframe-tag/same-https.keep-origin.http.html": [ + "c3033a6e899616c84c3e10d7054a11e12af784e5", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/iframe-tag/same-https.no-redirect.http.html": [ + "08805f9cf2952639320e90db966e54ac41cbf07c", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/iframe-tag/same-https.swap-origin.http.html": [ + "da8d438a7a28129f5ee6eef331ef8dcac459abd7", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/img-tag/cross-http.keep-origin.http.html": [ + "dca8e28f878bfa29752db5c35e39a434b932ff1e", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/img-tag/cross-http.no-redirect.http.html": [ + "dc43ea6210636ec0f237395a61a72454084425e2", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/img-tag/cross-http.swap-origin.http.html": [ + "565e2dabf94f6f556791d9001ef93aae16eda60b", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/img-tag/cross-https.keep-origin.http.html": [ + "3774470b3cae7364734cd745b673294f3984551d", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/img-tag/cross-https.no-redirect.http.html": [ + "29d6f99255f92fbd5003c72d76f013b7903ddf1d", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/img-tag/cross-https.swap-origin.http.html": [ + "613c5af5d19e10a52ecb9b795eee7d164e5a46f7", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/img-tag/same-http.keep-origin.http.html": [ + "b4fba605c360c63278fa4088ac42cd5bda459fa1", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/img-tag/same-http.no-redirect.http.html": [ + "31ab15865fdcb45d6562c82cc9e00df678902aeb", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/img-tag/same-http.swap-origin.http.html": [ + "c655f801454b2ad2c12b9ced5faf9cb955a7fc3d", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/img-tag/same-https.keep-origin.http.html": [ + "cdf523b75b8c59f394a2338f8d75fc0a1db82cfd", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/img-tag/same-https.no-redirect.http.html": [ + "56006e38eb4fa125a6a00f3b3c3a99cf5610b5fe", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/img-tag/same-https.swap-origin.http.html": [ + "76f5588f8fe022f2f8b67d6939457238d3fcc6a0", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/script-tag/cross-http.keep-origin.http.html": [ + "61b3dc353dd58780d83bbef36be35928a0534536", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/script-tag/cross-http.no-redirect.http.html": [ + "22dbcf6e0b0a190aa63126aa6b030e6668e98c4b", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/script-tag/cross-http.swap-origin.http.html": [ + "ba70f3e5394dd6512d76452acd3faa7d9298682c", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/script-tag/cross-https.keep-origin.http.html": [ + "757034e2d85ae2c7f6fe0ded27f55351efae4c2f", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/script-tag/cross-https.no-redirect.http.html": [ + "8147e540a85bc4bf4a975e537284f30628ae79e9", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/script-tag/cross-https.swap-origin.http.html": [ + "68aa797c7f2bc3bf25ad3c9c703aa0014a91d8da", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/script-tag/same-http.keep-origin.http.html": [ + "5296cde8939d8d040d0ed118b6bb9238e03461ca", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/script-tag/same-http.no-redirect.http.html": [ + "30ae08271c53440779784cc9b02c996225b55d61", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/script-tag/same-http.swap-origin.http.html": [ + "62d681f182e119853ff4dd6f21df8df0da253a4a", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/script-tag/same-https.keep-origin.http.html": [ + "43a71d98fa9b5a53f049820a448102a69ea7073e", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/script-tag/same-https.no-redirect.http.html": [ + "ba7fa7358ded7223e6cc6b6eeafde1f9523e4366", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/script-tag/same-https.swap-origin.http.html": [ + "7e0eb5ae616722fadb70c4736a26a7cefacb4df7", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/sharedworker-classic/same-http.keep-origin.http.html": [ + "c48229fdc5e6cdf789722d8d3fc9e7d98156f9ac", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/sharedworker-classic/same-http.no-redirect.http.html": [ + "1dbc19eefcdbde62b1447b925e22f682c2917068", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/sharedworker-module/same-http.keep-origin.http.html": [ + "0f642dd00bf1adfe96c548dead542ca637e1e1bb", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/sharedworker-module/same-http.no-redirect.http.html": [ + "28ce5d3c446a47614729ef9b6b349a87f5c2b549", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/worker-classic/same-http.keep-origin.http.html": [ + "e521998811190b09d29d1176192404722d819cd9", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/worker-classic/same-http.no-redirect.http.html": [ + "1dd9edc83536d479b761d274667ee2771ee54e26", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/worker-module/same-http.keep-origin.http.html": [ + "5fbad9e6837ea830dca21c1f437d219d254d4c83", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/worker-module/same-http.no-redirect.http.html": [ + "1c7f32f25369c15ce4450c6050954708263597bd", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/xhr/cross-http.keep-origin.http.html": [ + "fa6538704c2d91b95e68733b13c0d3833e846e5c", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/xhr/cross-http.no-redirect.http.html": [ + "86b997fc9bb86b88ef16a67ce2cb00e1a63fed9a", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/xhr/cross-http.swap-origin.http.html": [ + "2b88e6fd07465e78f998f66fd5000dc6c3e8d0c1", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/xhr/cross-https.keep-origin.http.html": [ + "e573fac89305e4eb658663928d77b8bd51326846", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/xhr/cross-https.no-redirect.http.html": [ + "a8ffa5661e9c479374da5ff950df0e387d801f2c", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/xhr/cross-https.swap-origin.http.html": [ + "4bd7d3fe73fb577efb52eb608e2a13442586eae5", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/xhr/same-http.keep-origin.http.html": [ + "3922cd7832aa615554eedbfefcd8af74f40aa74d", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/xhr/same-http.no-redirect.http.html": [ + "a583f1c93c5c7d283c2d7be268283b0b368d7941", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/xhr/same-http.swap-origin.http.html": [ + "e7572b32d85bfe1c057503cc51e47a47af35e570", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/xhr/same-https.keep-origin.http.html": [ + "8980cab88fd31ec4a1e989457e052bdf9a33b6dc", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/xhr/same-https.no-redirect.http.html": [ + "5008a4a04f1e5e82bd755dfe66456237baf726b9", + "testharness" + ], + "referrer-policy/gen/iframe.meta/unset/xhr/same-https.swap-origin.http.html": [ + "f458232b5937ff2a80ab05baf297ca67823861c5", + "testharness" + ], "referrer-policy/gen/req.attr/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html": [ "c44fee3779aeb4203e01a894bf1c644b89f9f908", "testharness" @@ -707281,6 +731302,246 @@ "d0dac9ebd247578782d61eef926a57ca741c1fc7", "testharness" ], + "referrer-policy/gen/req.rel-noref/no-referrer/a-tag/cross-http.no-redirect.http.html": [ + "4a5f5ecfe3dbd571bb54271387d4d1fb90a19aef", + "testharness" + ], + "referrer-policy/gen/req.rel-noref/no-referrer/a-tag/cross-https.no-redirect.http.html": [ + "2f5fd5437eab808e1a9dd922432a494bb2be7d22", + "testharness" + ], + "referrer-policy/gen/req.rel-noref/no-referrer/a-tag/same-http.no-redirect.http.html": [ + "32cd1c43b0121d349919faa0d1c2a14df6ec02c5", + "testharness" + ], + "referrer-policy/gen/req.rel-noref/no-referrer/a-tag/same-https.no-redirect.http.html": [ + "9b11adb7cd704947827e89101ea6cfbb173d0f48", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html": [ + "3a2fef341a21cb585788fb26f2cd22092a2a3241", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html": [ + "cc0f4b65a03203d3c1390921564feb4066621b41", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html": [ + "9ad3aa7338f4722145a6d71c2f5d4b7df62065bd", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html": [ + "d6749143bb1c153f59166c078f44b64d80279498", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html": [ + "44ef71e1af1ff117cc8473ada2dbb421367682f1", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html": [ + "1488bfcb08b864da90e5daf6fe90109570aa77b5", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html": [ + "5189e5b183da7238ce1b9bb4ba2e911cd3a80fa3", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html": [ + "a2b9721f264a29b708cadc82d38cd17a14c10711", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html": [ + "4db9f9744048ddcecd9182b9f180bdd2382da6a1", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html": [ + "e6dfa2678a077261790feb411fb2d5b3cdecba8c", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html": [ + "45012e9b11accf3ee69b748c5ceb9e33205c6f50", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html": [ + "893c4748d9283784b4796ee839bbf1ced5067cbf", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html": [ + "83df0e2190ead3046ccd485b7fbcf834182c7011", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html": [ + "c944eefddf3d2523c83e8811fe3ea13d53365334", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html": [ + "3bcccc389521b2a7072317a6a41ddf98bed5a756", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html": [ + "0f8d65b94e2712ac4fd7de1c87bc5f5b33b18011", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html": [ + "20b86df93727e1a3cd997dc610542473626a6599", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html": [ + "817b3768da66bf3e5e5301191c92fefcc3558415", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html": [ + "d13cbf741b08241a885abc53f294ebaea1018748", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html": [ + "2fe4cc4cc4c43b073eda46b221592935693d0b99", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html": [ + "8ac803d881fbab6296eb25b914edb5f50d579d6b", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html": [ + "bca971f8e8481e059d002984e00ae8aae6475297", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html": [ + "f13303867c65ea27d9c8ce065a9dd31485ff65a2", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html": [ + "346f251cd1825c651826a9ac1f21ee7f0eeac39b", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html": [ + "2706bb4cd8bd13594c427743237fd3641b70a30f", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html": [ + "edd91848f7977f87d309960fe4fe54302096e149", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html": [ + "9b3f5c000ae013564f14e90de42a7a3835249824", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html": [ + "3f42792ab4ba5d399d9681c744eb7e443191d287", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html": [ "ee374dbf768f63d0b76205871a2f51c0fdc6d858", "testharness" @@ -707377,6 +731638,486 @@ "180358e691bd449b825e0c8f199d919dbd90c270", "support" ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html": [ + "454135a6897cf99882b89ef8b466c88d2f8c0c96", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html": [ + "f30073623a05869cc81d88e5d52ca4d78f7e238c", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html": [ + "de7fdc0e39ad672af73ad6de231d21e24002a9fd", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html": [ + "b62fc67630d6672a448b87f38e49382ad50a273d", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html": [ + "fb32b5a503e129048a53b7346f45bbc1e7eaa296", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html": [ + "992686390776306a63a37d97ae2a7d51607c1f1a", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html": [ + "dcb04ca83bf84b2028ae80b88841532dd98feff3", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html": [ + "210c86e6a8270a7cb3fb6094c7fd14ab8ac492b9", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html": [ + "a29cc6014c78e3f292066e616a3894a8e96d0f0a", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html": [ + "66a8c719e09dcc00630e4841682630f9a2197a1d", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html": [ + "09a2f75a6702816ff7245491ab99c31ccc0f71a4", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html": [ + "e36b05c013831dd0a22e99b56ccdd4d425bbaa3e", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html": [ + "e3611b9211e8f32b600a6ec73f8354d0a4ee575a", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html": [ + "bf883026942cb5f18e50972d29c6828659a2d1eb", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html": [ + "7d68c31060f9d85be980f0413a654fa89614c775", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html": [ + "8ab8ee001b7279e801d962d46246205012de6974", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html": [ + "f1b99cfcd43be53796ea0f7a0bd7cad0c37dc82c", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html": [ + "c567c3b30d9b270587c8109993e6b23ddaac5438", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html": [ + "9684fc1efcb4991668206dd5d6c216fe4df115e2", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html": [ + "4e428f5a26f259d35357497031b5cb48ed0a3ce6", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html": [ + "7247afb704bfa7e3007d521ae52f9d28100ed85b", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html": [ + "f28955960021cac3eba110cc7d22ee87d75b0ce7", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html": [ + "2beda3b8fcdae636753c8641e6d5354bcf7756c0", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html": [ + "a0a360043285aca81ffb3dfa3cceb683bdd74131", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html": [ + "4f5a64a94b6b6ed9beea59905bee6b2344ef9e22", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html": [ + "8090ee6df32b01683c4c54e02f828cbe8fd9b657", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html": [ + "8644d5a0dd3f25d6235a0c343ab14aabce204f40", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html": [ + "0871cbadcc1fb4b4157c4b6a4d419441fc7593e2", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html": [ + "074728c29717db5d555bebe59d62ea49471e9ee2", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html": [ + "80845aac30a980d78222a1773af1749fc0373fdf", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html": [ + "043f8b256466c19a18c31f24e7f3d78dd9120cf8", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html": [ + "9789c6b1454c4ee570ba07de8f515331990db67f", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/a-tag/cross-http.no-redirect.http.html": [ + "8d2c7d62d05d8fb70acd5c24032eab6bd9c36ad0", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/a-tag/cross-http.no-redirect.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/a-tag/cross-https.no-redirect.http.html": [ + "3356ddd4eff1517dccf82eb8685ac24d5357544c", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/a-tag/cross-https.no-redirect.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/a-tag/same-http.no-redirect.http.html": [ + "453be719b2b65737eac877716aae2e72d3751f05", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/a-tag/same-http.no-redirect.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/a-tag/same-https.no-redirect.http.html": [ + "528dfdc8a4ef2d458d6f8f112e3dfabe5b73c960", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/a-tag/same-https.no-redirect.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-http.keep-origin.http.html": [ + "9ee613a589c7498a02cc814c138df66f97b2a0ff", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-http.keep-origin.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-http.no-redirect.http.html": [ + "16bdcbd3662295b8b547110d4275f3c7c4fa3ec7", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-http.no-redirect.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-http.swap-origin.http.html": [ + "4c0d6b1bc4528c20e8744fe1cf16b8c4309b8dfd", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-http.swap-origin.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-https.keep-origin.http.html": [ + "afa9578a90b64d2e4cdb541af3caf734933542e8", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-https.keep-origin.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-https.no-redirect.http.html": [ + "273490cf78f81fb60e64c10a6b67f30288eec96a", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-https.no-redirect.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-https.swap-origin.http.html": [ + "7c364052af4bda4a3484f8f3f9ed831a62c01049", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-https.swap-origin.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-http.keep-origin.http.html": [ + "a5bf8817a37879a4e0113d493bd122304728e277", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-http.keep-origin.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-http.no-redirect.http.html": [ + "c4e5ae7aac3eacdf234746884d5922ac8ab23315", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-http.no-redirect.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-http.swap-origin.http.html": [ + "7dc9230eb3251e612eecdfc505f21018d6088a8e", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-http.swap-origin.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-https.keep-origin.http.html": [ + "1e5fda0ba4153d806408195b29ea0f1450bb4f7a", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-https.keep-origin.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-https.no-redirect.http.html": [ + "8cd4f077be39a3024f7a1bd18c119d79f0945049", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-https.no-redirect.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-https.swap-origin.http.html": [ + "234fc0efa04dfc6826e0a989b65b6ebfe5d2c845", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-https.swap-origin.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-http.keep-origin.http.html": [ + "9365b5ff308395d1ddf05735a1cecba33ff911c4", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-http.keep-origin.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-http.no-redirect.http.html": [ + "269808d268e0258304926efd1182bbe8dfb3ece5", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-http.no-redirect.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-http.swap-origin.http.html": [ + "9390f85eb1da4768b318971544dddb4302e6fccd", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-http.swap-origin.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-https.keep-origin.http.html": [ + "87c5977bab8aebddf3b0f2792cc70ee1279c8ae6", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-https.keep-origin.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-https.no-redirect.http.html": [ + "333b50990c5bdc8ea3f81afc40d0546049f4a1b4", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-https.no-redirect.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-https.swap-origin.http.html": [ + "edfb6d3079f969144cf5e4bf9ec6a241c579e143", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-https.swap-origin.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-http.keep-origin.http.html": [ + "e3c40e15aa4f0322c9cd090e42804922887fad90", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-http.keep-origin.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-http.no-redirect.http.html": [ + "0bae17cb5b425f8bdbc32bae0f19f17775faf9cb", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-http.no-redirect.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-http.swap-origin.http.html": [ + "8ded9a1a8f227c11b95ae73757e59b3b43caa9d8", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-http.swap-origin.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-https.keep-origin.http.html": [ + "24ae69a02c74f51ebaa7a458aa9578883c942358", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-https.keep-origin.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-https.no-redirect.http.html": [ + "a19cd9fcd6f7633c1bbec247b02cb2f210ab4b5a", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-https.no-redirect.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-https.swap-origin.http.html": [ + "cf0637a1236b97d2a0228c64a273fd73153fd10b", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-https.swap-origin.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/img-tag/cross-http.keep-origin.http.html": [ "a13393de325d16317259af29da298d544efe66da", "testharness" @@ -707473,6 +732214,486 @@ "b3b55087edbb50ad0a371ebb45776cf9943033ae", "support" ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-http.keep-origin.http.html": [ + "bed0df1ea56f978bcce30d453e9d1777ba1bc2c6", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-http.keep-origin.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-http.no-redirect.http.html": [ + "595bdf9f548fc6a12a460bc642b4b765d2511e50", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-http.no-redirect.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-http.swap-origin.http.html": [ + "22a6c54cbe45c2652f88ef781db09434aa4fbddd", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-http.swap-origin.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-https.keep-origin.http.html": [ + "0900b74070a8a1290769ac0d8e6a9c68cdcb787e", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-https.keep-origin.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-https.no-redirect.http.html": [ + "c0ae977af9e7e94dec9b4af599d31da7ea3a5768", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-https.no-redirect.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-https.swap-origin.http.html": [ + "52af1a183b2207f58f0cfe10b57b18a5fb96d931", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-https.swap-origin.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-http.keep-origin.http.html": [ + "c9eb1785b985c4defbf4bc45294fa7b5c15c081c", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-http.keep-origin.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-http.no-redirect.http.html": [ + "ae5d248f224e75dd8ff368f34f7a6c73ab577fdf", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-http.no-redirect.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-http.swap-origin.http.html": [ + "d569f7609df0bcec8229848f66583ab758043a41", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-http.swap-origin.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-https.keep-origin.http.html": [ + "9beee36b7121f3d407271e6f95239176eac65ecb", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-https.keep-origin.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-https.no-redirect.http.html": [ + "87a909b5eaf1756f119b3a3ace8e838f5c483061", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-https.no-redirect.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-https.swap-origin.http.html": [ + "3dcd278ac779dba0ffbf96e6020b399214902424", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-https.swap-origin.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/sharedworker-classic/same-http.keep-origin.http.html": [ + "2ac44d5037c27156137bf936956974dd8d6a8991", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/sharedworker-classic/same-http.keep-origin.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/sharedworker-classic/same-http.no-redirect.http.html": [ + "243dca79e812713f8d1f835f95114b36b9ee0e06", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/sharedworker-classic/same-http.no-redirect.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/sharedworker-module/same-http.keep-origin.http.html": [ + "efe40e142b3b5412ef663ed7781e72edb08c86f2", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/sharedworker-module/same-http.keep-origin.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/sharedworker-module/same-http.no-redirect.http.html": [ + "1625ee4b84f2a59795986e3362b15aae2c763cc8", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/sharedworker-module/same-http.no-redirect.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/worker-classic/same-http.keep-origin.http.html": [ + "f4e2f383fc41569fd7cb86b14821fe4c6f132e5e", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/worker-classic/same-http.keep-origin.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/worker-classic/same-http.no-redirect.http.html": [ + "d9c879782f9c6af474a16e874f500ac0547121b0", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/worker-classic/same-http.no-redirect.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/worker-module/same-http.keep-origin.http.html": [ + "48f0530f1412803fcada93fda626872c88efdce7", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/worker-module/same-http.keep-origin.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/worker-module/same-http.no-redirect.http.html": [ + "e94c9052cdcd0366fa05bc5ff456cbc3efd9786a", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/worker-module/same-http.no-redirect.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-http.keep-origin.http.html": [ + "6c8ddad3aac5c01b4af2c6a52a3dae4caed254cb", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-http.keep-origin.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-http.no-redirect.http.html": [ + "6f9539e17137d685d7f058d63d2d8ea2556a39e4", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-http.no-redirect.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-http.swap-origin.http.html": [ + "d897f770d0a9b7358a8b693c9c2fa3202d17a75f", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-http.swap-origin.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-https.keep-origin.http.html": [ + "ea7ebd0de0203e2394b7a9313957808a2abc61ff", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-https.keep-origin.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-https.no-redirect.http.html": [ + "ccc9c358a6b5260abc7a09b5f7f65f5b91a34093", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-https.no-redirect.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-https.swap-origin.http.html": [ + "e9782928f1a71104e09298b4b4a61eefaa64433a", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-https.swap-origin.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-http.keep-origin.http.html": [ + "0ba21b2dde8aca1a9aa2d9ecc455a7ea176497d9", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-http.keep-origin.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-http.no-redirect.http.html": [ + "dabd5a4ba3fe3f9bbbc0c4ea25d3fd432f037a19", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-http.no-redirect.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-http.swap-origin.http.html": [ + "5f43861b82e319dc480d62ebbdf0ab59745c17af", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-http.swap-origin.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-https.keep-origin.http.html": [ + "780efef0895453db2cb1942845e58d4f4188db09", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-https.keep-origin.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-https.no-redirect.http.html": [ + "4abad62c8e075c0221840f3cfe338f68d6d9dc1e", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-https.no-redirect.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-https.swap-origin.http.html": [ + "49022942df5196c558498937e7a448ef2ab37de0", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-https.swap-origin.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html": [ + "98e6f6d27431c697cd6997bffd859e28a3807514", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html": [ + "79aa6bdd3e05ad4fd97ffede70981aa0e65f2eb1", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html": [ + "b31a78b7e58c42915d527dae691d8e07dcd13b09", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/a-tag/same-https.no-redirect.http.html": [ + "dcb22415f640f8788b0e44c8b1c41a9a0bd898ab", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/a-tag/same-https.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html": [ + "3b81e22fbaf9daa84c02000e0034fa897d16b906", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html": [ + "1cd333be1af6f02e6aea7eae7a598ba6d9b0c4a5", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html": [ + "533cf24b69662943eec5bfd793d6d218127200bf", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html": [ + "b007a5269349b96c5a88c4585e6fef0e6ea69b6d", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html": [ + "c360718590b5271f526ece537e6ac1cf9d8c12fb", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html": [ + "890fa68bc70f64a725c513e4271d3ca8d3560df0", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [ + "d73a425b05ee640311c545c864aa72ac537529f8", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [ + "4c06af7c5d29eadb0eae8a6a9a191545409635c9", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-http.swap-origin.http.html": [ + "4678057b57e9878be58fa5addd10b270e73b9a3f", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-http.swap-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-https.keep-origin.http.html": [ + "e753c24324cf92c687878f434c23bcbd6a469e3b", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-https.keep-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-https.no-redirect.http.html": [ + "166a67766886b20a9737ed84b17f6226476a2295", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-https.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-https.swap-origin.http.html": [ + "fa36e48208eb7453bed8fca84051d52683d649a3", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-https.swap-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html": [ + "e715d4b6248f4edbbe0f376a4b86a3d7d408f308", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html": [ + "1bf67fb7151d51d04373fee1a4f4f43bf48c46c4", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html": [ + "c86e2c0bd807b13650e6d626772e123b9fc7b981", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html": [ + "15ab61b9c1b0af1c5a703e0f16a0b75bab407553", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html": [ + "f2ba3c48364253bce1799cdf4dda0853762d0ca7", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html": [ + "201c7d19e85ae712e6101b9ee3b05dce2417b523", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [ + "f657f82248f57d959b32c71039eeb9d646a54b41", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [ + "2bff97acfda4035925659610379674d661141ff9", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html": [ + "0c8a5b93218d3f5dc48027176d7df5188a95a683", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html": [ + "485ae0445ff79e5163523f04ac6d1d6fd1d46ca9", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html": [ + "658b1fe095aa1fc0ff9471a6ff0f0a0e8110636f", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html": [ + "2732639b7197ff27d33c29171ef0c5239c095420", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html": [ "67073e8b4a8ff09cd186e73c350727b548ca6019", "testharness" @@ -707569,6 +732790,486 @@ "a15ea7c65c8647c29e5ac992286568aa8dc013f5", "support" ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html": [ + "f3ac901578349514446ecaeafeaad0848be17116", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html": [ + "06554e4bfe9dd81b80269cc43ec0a705060c4ca8", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html": [ + "b3d71b211d2b154e8d2b22ca0a4d739f660a09a9", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html": [ + "3edddd9aeeeb8e49d4e61bdc9872198870d48517", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html": [ + "40f45282bae5d9cf1af56ed98c144de5aee9cf65", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html": [ + "8e8cd34be1dd520048622ac2acd92ff18e2982e1", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [ + "1ec6f13d722cc8f1c9aa83dfcc5c79d993e4d866", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [ + "6939aa4b06caab7bb4f6f99edf5b029d7f91312f", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html": [ + "2fcd6aff5320a8b67e8439b6d583d37828c8bc87", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html": [ + "6c153040306e5caabb58313959f0715028a6d4e0", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html": [ + "fa79d7269f5702f7519685f399e04cfcc8b36b45", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html": [ + "cc092ebb94d21c91cce3431aad4ebc8712fcabc4", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + "3a99b1930ec004c38c38fba1e6dbaf67214a2b68", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + "d0e4474f1c63dbd27e2886b083bcb11afd5f6806", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html": [ + "b7ee419b2d5685720d28c364deb367b557ae6a9d", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html": [ + "efe64233570bc2e7176e535140a2c61b797a6592", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ + "2ade2c6fc23ee7cae76547ec3e57726b9608769d", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [ + "2d717af1fe85afa660ae0ba6cab8d2e472c5ec5d", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [ + "11428f8d00f5895bf666118221762194d5095610", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [ + "70fa5775aee32e691e6712cfb35f7c8d41d56028", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html": [ + "d43208087de429b3948a79df2c64b5c27c16be9a", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html": [ + "8e12ec777d0f11e3afd5d2ddd93c25ee6629558c", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html": [ + "3a8c98a3557f047bb3880ffe72d5b102e6aad59a", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html": [ + "ed6546f98941b3f33cb907341169d7700944d139", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html": [ + "2333b3823b79b8b58941b7c5b9f7908f5161d819", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html": [ + "03d6aeace810479a064a18d40872d1e2c5c46f31", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [ + "7d468c866c20d58172774a1034d464f7f7716702", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [ + "d2c1dd60e20117f18dfabb166638a4b2c54613f9", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-http.swap-origin.http.html": [ + "9271fe9043f07a8e18b39a98cf20163ccdca5819", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-http.swap-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-https.keep-origin.http.html": [ + "f3b553667319627270a31a2aaf8ff62e2177a438", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-https.keep-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-https.no-redirect.http.html": [ + "b2f5c938b130c0f3bb2b272b32a8380bcbf9ca2f", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-https.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-https.swap-origin.http.html": [ + "df629d40d845a8e18af4647d76e514eb19963f7d", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-https.swap-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/a-tag/cross-http.no-redirect.http.html": [ + "e4d52e1a6d0bdb6885c6f4ca56cf98073070c753", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/a-tag/cross-http.no-redirect.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/a-tag/cross-https.no-redirect.http.html": [ + "b6b8ffa5c0cd2de10cf014090a400ac91455c0ad", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/a-tag/cross-https.no-redirect.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/a-tag/same-http.no-redirect.http.html": [ + "c085f58bd2b54f796ad7ea533086858248d9b6ca", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/a-tag/same-http.no-redirect.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/a-tag/same-https.no-redirect.http.html": [ + "aade5bc9f0f3446a99aef48f2cadbd09d10dc127", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/a-tag/same-https.no-redirect.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-http.keep-origin.http.html": [ + "5a31888e0e743821b6f80f17aa0d69f58b45c2c4", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-http.keep-origin.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-http.no-redirect.http.html": [ + "1b4a1fb3f0980934ebb0b075c154dd3789ee918a", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-http.no-redirect.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-http.swap-origin.http.html": [ + "063000a73c47f3609f166a4f1e0c6600577e8a3a", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-http.swap-origin.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-https.keep-origin.http.html": [ + "5dc7b4d3baad4186d75a927e37516a887214554c", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-https.keep-origin.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-https.no-redirect.http.html": [ + "1a0eb65669f137ed67ee832c3ab64513e773512e", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-https.no-redirect.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-https.swap-origin.http.html": [ + "50dd07cb6693031197bb8437f8f7220fef6fa63b", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-https.swap-origin.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-http.keep-origin.http.html": [ + "fd4ce963463ab89a20ac04e6a30974e8a3aced34", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-http.keep-origin.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-http.no-redirect.http.html": [ + "e0c0411f1fa975b186b91c5f45815f3ea68e347a", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-http.no-redirect.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-http.swap-origin.http.html": [ + "6ef0d3516851765657a743642dcf2c4e7658d0d1", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-http.swap-origin.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-https.keep-origin.http.html": [ + "ca22eec1ff61d33618382c360fefa5c20d81ad82", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-https.keep-origin.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-https.no-redirect.http.html": [ + "3473e1e86a9238374fa52072834508029e514c55", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-https.no-redirect.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-https.swap-origin.http.html": [ + "85d4011f13564fecdd888a296a7dc6d27629073e", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-https.swap-origin.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-http.keep-origin.http.html": [ + "8d4d6c5f87825314605b495077bfd8a40818a6ca", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-http.keep-origin.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-http.no-redirect.http.html": [ + "9d91a5f2d5104c7f8147cfbfd1d861e04a540dc3", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-http.no-redirect.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-http.swap-origin.http.html": [ + "8fad5110c9f4d3b31674587f6276a79afbb011e2", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-http.swap-origin.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-https.keep-origin.http.html": [ + "e323ce596e601083c609e28119d00f3247631748", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-https.keep-origin.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-https.no-redirect.http.html": [ + "3eab85fec6396a0b711552daba62f62abb05c7c7", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-https.no-redirect.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-https.swap-origin.http.html": [ + "280f386fb661d808ea0263907b7bc59228b28d07", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-https.swap-origin.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-http.keep-origin.http.html": [ + "08f66c76a8faacf42d7805c8266f197f810fb4be", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-http.keep-origin.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-http.no-redirect.http.html": [ + "a9cfc20984345cc62bc6f4347bbeb6178299e86f", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-http.no-redirect.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-http.swap-origin.http.html": [ + "2d3c2e3340aaf99fb99c525d9160569c8197f741", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-http.swap-origin.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-https.keep-origin.http.html": [ + "0274d37ae6ecbb2c5c5cdc11b0e2d15c5ab994b7", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-https.keep-origin.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-https.no-redirect.http.html": [ + "a821f5f3ed3558793ba73386c363810e51a9cb44", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-https.no-redirect.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-https.swap-origin.http.html": [ + "8df747a25f97f2561dfa602822384da64a1a6726", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-https.swap-origin.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], "referrer-policy/gen/srcdoc-inherit.http-rp/origin/img-tag/cross-http.keep-origin.http.html": [ "247a4419aa736db17aca4a796b1d76da5b8ebc3f", "testharness" @@ -707665,6 +733366,446 @@ "ecff74b90dc209912b003388bcac7ca584b12762", "support" ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-http.keep-origin.http.html": [ + "5f9ae9c0cf4895602af6e23763ac3d6c0523e232", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-http.keep-origin.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-http.no-redirect.http.html": [ + "fa879102e91509334555011ab074c2684f462a78", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-http.no-redirect.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-http.swap-origin.http.html": [ + "d1cab5cd07c720e7d0ddd109836a01e10b850e73", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-http.swap-origin.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-https.keep-origin.http.html": [ + "6e7d68b6ad5cdc903bbc1ab5766cd4a3bbe8a3b3", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-https.keep-origin.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-https.no-redirect.http.html": [ + "f088e46b3082f5efa0303801c14fc474613e93ce", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-https.no-redirect.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-https.swap-origin.http.html": [ + "9f7feabb04db28e1b47710e28774d1fa0609d4b8", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-https.swap-origin.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-http.keep-origin.http.html": [ + "7aa791e90de9f255766611f59f002a42ccc30035", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-http.keep-origin.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-http.no-redirect.http.html": [ + "8ee1801df2058f52bae28e17a8d1c281e80505eb", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-http.no-redirect.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-http.swap-origin.http.html": [ + "8884bb2e2040040c555a3d04b064e69fed078db3", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-http.swap-origin.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-https.keep-origin.http.html": [ + "9444c8a1c20059c11dbb78b958e830f1e80f09e3", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-https.keep-origin.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-https.no-redirect.http.html": [ + "c63d2a90632464f14f1c8094fec131856dc3ca3a", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-https.no-redirect.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-https.swap-origin.http.html": [ + "6a8bda085d0ab31165c3c0087706abfa54fc8b39", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-https.swap-origin.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/sharedworker-classic/same-http.keep-origin.http.html": [ + "3f6d68561a6f4756c979f6568d927661369237a4", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/sharedworker-classic/same-http.keep-origin.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/sharedworker-classic/same-http.no-redirect.http.html": [ + "bef5eb7da64de09b03e8241dfdf933ff75e079f6", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/sharedworker-classic/same-http.no-redirect.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/sharedworker-module/same-http.keep-origin.http.html": [ + "b7c2b859a5688128975c0d08b2137a099717b104", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/sharedworker-module/same-http.keep-origin.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/sharedworker-module/same-http.no-redirect.http.html": [ + "fa3a2cad441275f43b15286e0556e4663d4a2ce1", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/sharedworker-module/same-http.no-redirect.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/worker-classic/same-http.keep-origin.http.html": [ + "2d0497d84554787d2bd961e975211756f31774c8", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/worker-classic/same-http.keep-origin.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/worker-classic/same-http.no-redirect.http.html": [ + "984223140dc6066f7fb6f901e5ed5b224490b69f", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/worker-classic/same-http.no-redirect.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/worker-module/same-http.keep-origin.http.html": [ + "a12d17d87acdeb25b76299e3998b618c6fa127b8", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/worker-module/same-http.keep-origin.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/worker-module/same-http.no-redirect.http.html": [ + "c0fa2219a73eea8cab5935a3c7933eb03d56b5bc", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/worker-module/same-http.no-redirect.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-http.keep-origin.http.html": [ + "b16b541c6300190cdcc5d11a58157f7f32b47fe4", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-http.keep-origin.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-http.no-redirect.http.html": [ + "cfebe7ee6d0f4192d437964ccbedb7267f8425cf", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-http.no-redirect.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-http.swap-origin.http.html": [ + "2965d4217c22c9af7ce271aed30b73cbf79c5e17", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-http.swap-origin.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-https.keep-origin.http.html": [ + "dc4ed5acae6d9e1ce0aac96c0c5730ba36c8a1ad", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-https.keep-origin.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-https.no-redirect.http.html": [ + "eaab3c16915cfa527cbe3e7383daee28a084070c", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-https.no-redirect.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-https.swap-origin.http.html": [ + "d6b2c75033c573f6ac24312c7977a5950893e424", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-https.swap-origin.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-http.keep-origin.http.html": [ + "f548a0f5325e34957f3007dea83c4c84aff5cf79", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-http.keep-origin.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-http.no-redirect.http.html": [ + "922193259a227b0812c82e7db6c03773ff07b868", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-http.no-redirect.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-http.swap-origin.http.html": [ + "379acc1be7b848b47331ad62a0157da5d2b58903", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-http.swap-origin.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-https.keep-origin.http.html": [ + "ce87a70cf5fa31da65dcd9e483e3ffd80ac9757d", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-https.keep-origin.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-https.no-redirect.http.html": [ + "54438244fcb69323c80006d4fb3e229ae30d0d4f", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-https.no-redirect.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-https.swap-origin.http.html": [ + "c4fe5c745c8c14f1ab940b04dd21f0ee6db3214e", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-https.swap-origin.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/a-tag/cross-http.no-redirect.http.html": [ + "11ba0cff5b85163ba3495601e42bad94c33ba0e9", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/a-tag/cross-http.no-redirect.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/a-tag/cross-https.no-redirect.http.html": [ + "e9b2fa290e0d05dae9c48e07452cf5b2bc2cb7f6", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/a-tag/cross-https.no-redirect.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/a-tag/same-http.no-redirect.http.html": [ + "312e72fefc3e5ca1c5e0d638ceb6dae968a3339b", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/a-tag/same-http.no-redirect.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-http.keep-origin.http.html": [ + "df64ef001a444f6a573e906e89f521dd01faf1b6", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-http.keep-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-http.no-redirect.http.html": [ + "a7849a34a58b64dfd700b7cb5919979abc4cbe75", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-http.no-redirect.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-http.swap-origin.http.html": [ + "9227aa6504b94968aec4d0c3be9695c48a5ed388", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-http.swap-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-https.keep-origin.http.html": [ + "eac631dcd858e363c9c5cfb0042b0c0b40a67500", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-https.keep-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-https.no-redirect.http.html": [ + "6b9a3b87481caf7eec5f34fd9bccb91cb4289552", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-https.no-redirect.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-https.swap-origin.http.html": [ + "d5bd29863ac25805710b324e3f6ea0e07e9dfc3e", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-https.swap-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/same-http.keep-origin.http.html": [ + "2ad40ba02c43a7f78014483391ed8c255e174804", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/same-http.keep-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/same-http.no-redirect.http.html": [ + "1d7537b7f62d7a2a8d2f0ab265bbbef91bc99141", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/same-http.no-redirect.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/same-http.swap-origin.http.html": [ + "eed719f8ff039b20c31554a3a01a115a7df11745", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/same-http.swap-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/same-https.swap-origin.http.html": [ + "9046b2917fe8483e12cb68f93f653880ab2cee67", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/same-https.swap-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-http.keep-origin.http.html": [ + "8260fc22125184099bc069e8a7ade116bb9ee4b4", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-http.keep-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-http.no-redirect.http.html": [ + "9b96eb83e8038222acdce8ecaf4a536927638e69", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-http.no-redirect.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-http.swap-origin.http.html": [ + "9ce3ea32d21e3197932245df3305ed9277752667", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-http.swap-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-https.keep-origin.http.html": [ + "b6777030d322574d7c2142b0158afc91e18fb5b8", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-https.keep-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-https.no-redirect.http.html": [ + "4a38816178810cc258e3ba05a544e8980629ec46", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-https.no-redirect.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-https.swap-origin.http.html": [ + "928c87fd5279f38302590c8ec8e58597a3ed8dd4", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-https.swap-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html": [ + "f52c74c5b492abf91d3498bc171a1f64ba5dee86", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html": [ + "6594fe36ddaa38e56831d440bead8f57ba3c7348", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/same-http.swap-origin.http.html": [ + "a35df42d943937e17bddf05320be0e9f3894fd6e", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/same-http.swap-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/same-https.swap-origin.http.html": [ + "2990c3865fcedc018f0a557ae7c993de9897e0ed", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/same-https.swap-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/img-tag/cross-http.keep-origin.http.html": [ "dcf44f75b48471df7235fff20c31dc843821ce8f", "testharness" @@ -707745,6 +733886,454 @@ "be66cf9321103b1397670f3acc89cecc09aabec2", "support" ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-http.keep-origin.http.html": [ + "0b845c4f0f5f42d3c5b20a9e57379f301aa47ef3", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-http.keep-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-http.no-redirect.http.html": [ + "8fc0c7907428e4fae9b38d7f58070aefdeac747e", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-http.no-redirect.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-http.swap-origin.http.html": [ + "018303acb3d9f34b980cb92c8b2c7a099032943f", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-http.swap-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-https.keep-origin.http.html": [ + "0803f353657abec3dc3dc531ed59b8e84532820e", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-https.keep-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-https.no-redirect.http.html": [ + "087dc921eab3c2ecee34e9423946a4fb62fa08b3", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-https.no-redirect.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-https.swap-origin.http.html": [ + "1ae391213b7239cb4eed90fda890f561e59f0e06", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-https.swap-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/same-http.keep-origin.http.html": [ + "c5565d7c12d47c2fec9575553090e30377f79e6d", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/same-http.keep-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/same-http.no-redirect.http.html": [ + "434f40b5b611aa09a150779d5e4a61332b1feec0", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/same-http.no-redirect.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/same-http.swap-origin.http.html": [ + "57f639b771ce9b5c829a127f0015ffa2515f774e", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/same-http.swap-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/same-https.swap-origin.http.html": [ + "5c395ed626f99959769c7c23bf1d61366e2c2a5f", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/same-https.swap-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + "32a212bfdb98bf4f7173c3a9414daea62f8e8f63", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + "b04cf9c48e894b753c58e29d2eb48453aea0214a", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/sharedworker-module/same-http.keep-origin.http.html": [ + "c118be09e7879d0f43189ddccaaef39be6531112", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/sharedworker-module/same-http.keep-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/sharedworker-module/same-http.no-redirect.http.html": [ + "cde9e3540709fc701ce35b7cce2ae8e33ac72f49", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/sharedworker-module/same-http.no-redirect.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html": [ + "37d927bfb0174f40a8fd461f1789e0befa13e316", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html": [ + "1ba3a70a6f51297ef3d6eb9a068de70e5cee0ff3", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/worker-module/same-http.keep-origin.http.html": [ + "4c26a76f830ff00f665699c33281f4fa1dc8cb86", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/worker-module/same-http.keep-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/worker-module/same-http.no-redirect.http.html": [ + "cb4c3f7005113dd3e3b562d0f58612b9915282dc", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/worker-module/same-http.no-redirect.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-http.keep-origin.http.html": [ + "9d5ba540dc799ff5c27c2370c5e3e08f78a0c67c", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-http.keep-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-http.no-redirect.http.html": [ + "b6023b9778c29b7619bf6ced9fc08bc454eb9058", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-http.no-redirect.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-http.swap-origin.http.html": [ + "9f9749dfc9fd33fa7e05ce9e9c36c7142c511635", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-http.swap-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-https.keep-origin.http.html": [ + "2663cdccae37b4bb24714e5d21b5211bb1cab763", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-https.keep-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-https.no-redirect.http.html": [ + "082795f8837e0c1d0d744ec0eda69c53226e1af3", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-https.no-redirect.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-https.swap-origin.http.html": [ + "56b25d3c6d42eeccb5a377b3582e2d18cf3c14cb", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-https.swap-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/same-http.keep-origin.http.html": [ + "0cef414243955be34c5af4392057d96e0a520534", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/same-http.keep-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/same-http.no-redirect.http.html": [ + "6492dca77521a3e0c5b6afec93d23f7df9a6c82c", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/same-http.no-redirect.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/same-http.swap-origin.http.html": [ + "1f4240d0f9aad5b66acfa27f146311e19b1cb6da", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/same-http.swap-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/same-https.swap-origin.http.html": [ + "fd5d81f0de01f87bf6bb00241838d1e6b7591e39", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/same-https.swap-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html": [ + "b86c8b029eb61f1e2acfac335053f03950374460", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html": [ + "50272094e567509e5899a686d6f4ed75a2b44ece", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html": [ + "accb5c03a04d8e43ae74326df54f3ffa4ded8675", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/a-tag/same-https.no-redirect.http.html": [ + "95fff01eedc6ba538374b4ceb2346463723ed515", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/a-tag/same-https.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html": [ + "216819e943e6ea4956fc258ca7d12c020e9a433d", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html": [ + "5abb91a541d59ea91438d284231fc0d9841c5a44", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html": [ + "65b343d154513418e0a19555b86be6b20f28e397", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html": [ + "b329836048b667d674dff710db8a50cc3830eef8", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html": [ + "ebe229fbc9864b2e2ef5afa556303491e7323ea8", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html": [ + "4ee020d792948337f2213bc204638668c961398b", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [ + "4aa4c2fbf95b3d9ee75d43b789b4a731c59ffcc0", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [ + "4f302c832e1c269afcf471a71d5a144d06a55601", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html": [ + "c1d7739619afdeb60201572062620bc63a15efd2", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html": [ + "e609db087e4fe3b41ca7d497ea36a5f44f594a9a", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html": [ + "88ecb3313418aa00876e12d13d6c5c36b3a2865d", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html": [ + "0a25c665b9162b4b38dbe992236ce38381e8fd5d", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html": [ + "1f821352af738d979b99fdb1f43237c4ae289077", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html": [ + "85c36a9d71c7988821f6ea4cf5e6b08929b0e99f", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html": [ + "27eb9d179baf0b7a91d8f9de9bf29ee4101b512a", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html": [ + "8c0e86d6efb0272a5971f3ecdf0e39c076d1a642", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html": [ + "66baa979f310b66f940f559abdd487e8c25b425a", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html": [ + "8997425fb74d2a21859181c0134f1483b023b901", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [ + "0f764baf6f7cf37fa61ba81e87a45a206f6cb483", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [ + "b2d1210eb1aff1bc96ac94b765f4ffd327995eb5", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html": [ + "8a44aa18290703eef089ec6d29dc37b362bc71e5", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html": [ + "1a86e9111c4ce932d1bb4a0c7e4cc55ffca097e1", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html": [ + "207494ac5812f97fea1e23e728b15328ab6257f3", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html": [ + "e11b81e3e1e098cbc918200a4d55210fcd0bab7a", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html": [ "c05839c7d525c17ff9f079515510b78afa9a5c9b", "testharness" @@ -707841,6 +734430,486 @@ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", "support" ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html": [ + "35b43fb9e87bcd4083d72d969cfc11cce8a8cc41", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html": [ + "d43d4a7c62c9c1f43f8ee1e0c8f9641447f77ced", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html": [ + "edf9d48da67039288a95fbdd4f650312b376e837", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html": [ + "8bfa78dd6b35f552ea71eebed77a08b5305bdff3", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html": [ + "0feaac68aef71622c384e411e851a8d5624222b6", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html": [ + "24b3e8b11e230d83a835745780836abedc794524", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [ + "47f76dd7c2d996c1ab1fd0d42179554a343ac930", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [ + "3257160dbc4db8f63f0cae852e92036fe1000415", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html": [ + "95c5dc502ce10778a4fc030d5e982a561e9f330d", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html": [ + "35ce769a3f2615231ab5dcb7ca52d4ccc1911050", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html": [ + "7f66a377aaa35db6cb9e1e47e2c037da5cd5a85d", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html": [ + "3d3ebd71c6b701745669015d5da9a1e634c12538", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + "e02a3d9b47d03ec669fb060562b1e94f37583f09", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + "0c2066808a13fb02dcbb39da8ba3fa4642cb0eee", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html": [ + "4558ecd695c3eac1443aed69053281654f2d14b3", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html": [ + "b6ecf0acaa2a6e184b3776a0710c587ec3bc90b9", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ + "f748c1a51efbd06671b5987a4ef95ac72d1c9c23", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [ + "5eb46804d0c3dcebdcee121e196ad0650e771596", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [ + "52b3b026379740b85aeda43d46574a12eb2ab582", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [ + "9757249092c2178542fd0d61edb83da628296d52", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html": [ + "57e9557530b1fc758d01395a4ee621879a1b7b73", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html": [ + "99bc501f0b53c5b9147a69c77aa4969773d57ee2", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html": [ + "1c73ce0de3e1dd780b8cce7005f1df8634b4b6e4", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html": [ + "f21311c253aac03bb33986cc2df4c9bc8a44f968", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html": [ + "c88d9308cac0185b0fc8cc716385d068d09b136c", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html": [ + "3063087aebc38acbd0183c6f8cc0cf43fb4323c3", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [ + "6e823d5736ea5a9ef539445325385a758d050b9f", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [ + "c72888b0ce4c43c4f3ef0212f7333ad82d8cdf6d", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html": [ + "edf0f974de490b99167fc0eacfac1057d47c1662", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html": [ + "89493f9d6ab550a93618fd3ead5b81bbb257781c", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html": [ + "60e6d0bddc3e5feb74a1648963a69eae3a9702bd", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html": [ + "af90b6d6d570ba2ddb7bfcc39c24e5e2cd3ebaf3", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/a-tag/cross-http.no-redirect.http.html": [ + "e47aa56c9a7a1569c41e783ad20340bee443f93e", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/a-tag/cross-http.no-redirect.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/a-tag/cross-https.no-redirect.http.html": [ + "a46564d17ca65bc0662f6d77706ff5b919cef4eb", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/a-tag/cross-https.no-redirect.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/a-tag/same-http.no-redirect.http.html": [ + "14a9793f0f0c6f765c5b57fa1a5fe1c387ed5c3e", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/a-tag/same-http.no-redirect.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/a-tag/same-https.no-redirect.http.html": [ + "79c592334da6d7937296c020f55c1933c646c219", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/a-tag/same-https.no-redirect.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-http.keep-origin.http.html": [ + "8ca065157bf300d5c8c64caa5d2e55f6bb4e2cd2", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-http.keep-origin.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-http.no-redirect.http.html": [ + "bd1b3be41025ac3df140134c27d03fa69dd1aa09", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-http.no-redirect.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-http.swap-origin.http.html": [ + "a16b2550cbbc9dc3268fffddebe2d75e539a6dae", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-http.swap-origin.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-https.keep-origin.http.html": [ + "31bb5855a390cd68308e80602cf074d6546c43ae", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-https.keep-origin.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-https.no-redirect.http.html": [ + "74502f566f2f218aa499a85e60227782cb6920e3", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-https.no-redirect.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-https.swap-origin.http.html": [ + "0fcb69a68f49b05b2946524e341261ea6509d23b", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-https.swap-origin.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-http.keep-origin.http.html": [ + "1ed0eff201b2529b11bc2697a4ee627fce58e3e1", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-http.keep-origin.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-http.no-redirect.http.html": [ + "a22796303225119b24d8522d9293dd064a478511", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-http.no-redirect.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-http.swap-origin.http.html": [ + "61918a3e2c96d5f723010f8a0a053295e47605c9", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-http.swap-origin.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-https.keep-origin.http.html": [ + "5ba49a8f9b1318a23c0cc9852d4d12f936c4a040", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-https.keep-origin.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-https.no-redirect.http.html": [ + "d48ad50c7d226552d1d97d292823c846c9faf7e6", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-https.no-redirect.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-https.swap-origin.http.html": [ + "39b88314d866b8b9f9d40759b8a3e3957df0795f", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-https.swap-origin.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-http.keep-origin.http.html": [ + "0fcfd219e72607798195b81a6a6f37a0b794237d", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-http.keep-origin.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-http.no-redirect.http.html": [ + "ca1a84f1386c82d01cd75585cdb2387902d6d25c", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-http.no-redirect.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-http.swap-origin.http.html": [ + "34dc34a37a0549c0ac1300b509252ceeb8ca687b", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-http.swap-origin.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-https.keep-origin.http.html": [ + "e37d09525498274e345c29eab3da64e0bb930dbc", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-https.keep-origin.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-https.no-redirect.http.html": [ + "d61b4b3fb758ed9e136960a51a86cad5b1e5ef0c", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-https.no-redirect.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-https.swap-origin.http.html": [ + "4799959db4c2d122143a4262860f94cba198cde6", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-https.swap-origin.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-http.keep-origin.http.html": [ + "05b1dfbe0bafdb92a9439c2c3d9c31062528e4e2", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-http.keep-origin.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-http.no-redirect.http.html": [ + "759cde4dfc3debc46dcf2835f9536a2f21bec750", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-http.no-redirect.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-http.swap-origin.http.html": [ + "66150c45b969be7b614f5583471068b9360fe0e3", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-http.swap-origin.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-https.keep-origin.http.html": [ + "ba343e5443e0fea6f095c9370afb74a460ae8741", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-https.keep-origin.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-https.no-redirect.http.html": [ + "47b85b6f3a0ea3406746f6f060e145392bb94d71", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-https.no-redirect.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-https.swap-origin.http.html": [ + "1ff4095c70df098d2304dafe8a1a9b9bcd355798", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-https.swap-origin.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/img-tag/cross-http.keep-origin.http.html": [ "f5bc1f0282c837dfceb4589f59d209d16e01d86b", "testharness" @@ -707937,6 +735006,486 @@ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", "support" ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-http.keep-origin.http.html": [ + "a4f4763d8e799697875bb1bb71c1d947f88f2ebc", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-http.keep-origin.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-http.no-redirect.http.html": [ + "07bd1f3b5a0fc3e3f94dc52c8496852f2cac22b0", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-http.no-redirect.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-http.swap-origin.http.html": [ + "c6d79ce7376186a485cecba2f29cb295706555e3", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-http.swap-origin.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-https.keep-origin.http.html": [ + "20853e45299d486c59b9ea81ee8e9371e5dac875", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-https.keep-origin.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-https.no-redirect.http.html": [ + "903deead116e2cfe7da531e0dba038f169aa2a62", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-https.no-redirect.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-https.swap-origin.http.html": [ + "179ac3c0b260ae8658b8155cd9488d1d96b144fd", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-https.swap-origin.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-http.keep-origin.http.html": [ + "7ab79d44e340cc1950e360b2d48d62aaac518ae3", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-http.keep-origin.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-http.no-redirect.http.html": [ + "d90330a173870f304ba0c794042497912a51b171", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-http.no-redirect.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-http.swap-origin.http.html": [ + "d103b98393e122ed3f1e19b11662324c30cbfc06", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-http.swap-origin.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-https.keep-origin.http.html": [ + "eefca7870fb0d21954a8da0e86be619f73704503", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-https.keep-origin.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-https.no-redirect.http.html": [ + "d658b8ce2d9c431b2ceac5deb80b118d55a042b3", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-https.no-redirect.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-https.swap-origin.http.html": [ + "c9b2e5eff58a2956bf0d052a478d5bd3679e70f7", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-https.swap-origin.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + "cc59b7e9531c173fff0bf7ee6a55484d84555e2c", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/sharedworker-classic/same-http.keep-origin.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + "a792e81cf85c91dadf719e56536c3ba735ae8ed4", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/sharedworker-classic/same-http.no-redirect.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/sharedworker-module/same-http.keep-origin.http.html": [ + "5f469a739e02e11cab64c0fc3acf8cd91e2ab7df", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/sharedworker-module/same-http.keep-origin.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/sharedworker-module/same-http.no-redirect.http.html": [ + "7e5756f013dea558e3c4437bbcfecb846548bd9d", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/sharedworker-module/same-http.no-redirect.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/worker-classic/same-http.keep-origin.http.html": [ + "ee1bd3961e5a6202afe888e9ff28fccff1398185", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/worker-classic/same-http.keep-origin.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/worker-classic/same-http.no-redirect.http.html": [ + "fe55ec98cc51f6e7b94ba7158863b37d61c4c095", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/worker-classic/same-http.no-redirect.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/worker-module/same-http.keep-origin.http.html": [ + "0512934a37492789f3871e43f94c6fc42d83de2c", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/worker-module/same-http.keep-origin.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/worker-module/same-http.no-redirect.http.html": [ + "5706193e4e42c62b90a09400498a320346c24554", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/worker-module/same-http.no-redirect.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-http.keep-origin.http.html": [ + "9585d997e70755229fa975466211bb3496ca148a", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-http.keep-origin.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-http.no-redirect.http.html": [ + "00621ae93cc91bda42070d6b6690d69c9b1ab31e", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-http.no-redirect.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-http.swap-origin.http.html": [ + "a8d0d93598405294033758ade366897813369fbf", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-http.swap-origin.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-https.keep-origin.http.html": [ + "0a692126639e137a5c90afb60fb9bba6f394f727", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-https.keep-origin.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-https.no-redirect.http.html": [ + "741b1e9fb6a6223b4f979f703ba061f7c15bebd9", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-https.no-redirect.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-https.swap-origin.http.html": [ + "1e9665e4819b3a8656101168ce077308445aa832", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-https.swap-origin.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-http.keep-origin.http.html": [ + "21bae18c44ee93c0b7a303500f4088988ace5d87", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-http.keep-origin.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-http.no-redirect.http.html": [ + "dafb3bf2687d72f0d4a86bc3f96aceb0ffd9ceb8", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-http.no-redirect.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-http.swap-origin.http.html": [ + "cea515ee7f8a8e7fbadc08052103757f3d69c4c5", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-http.swap-origin.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-https.keep-origin.http.html": [ + "47b2785202af7e3236603e2166248d3ac2a1a493", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-https.keep-origin.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-https.no-redirect.http.html": [ + "bf95d5806a1b23c81da7a5aa89d85dc1083a2305", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-https.no-redirect.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-https.swap-origin.http.html": [ + "738c32fcb7dbc2fcf12b79caec951454b901be97", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-https.swap-origin.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html": [ + "407664e35fd93300f045e1ae3d3c5947ae4cdf87", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html": [ + "67f97955b96852652072c818300b01e4edb412f1", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html": [ + "5a2f1bdb1f65324fbdb18d77d3d6c97dfaece016", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html": [ + "67434f3d0a76f912d91090c34a7782aae22a75f5", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html": [ + "ac46787ff7a46a90ab02bd3cf8b8f4eac3302108", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html": [ + "d4554d3e4cd06691e5664403849ff5236d7ac9d8", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html": [ + "ddd9f98777844636b0eaa23beb58d5b6846a65a3", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html": [ + "f276ee956b26881599fb99cc7166cc4133b5b62f", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html": [ + "121c1d76cc3b0f45e11453a51ec0bbf71fe59e47", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html": [ + "59a27ac548f7a92cdc78b783824130cb3125cb5e", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html": [ + "32986880571a7f9eb827c81a084edf12f28f5284", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html": [ + "a2bdffcb2b250c7185ad56bc8bc4edb5ed2274c2", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html": [ + "1da9f319a17b64664abccd297f0a44160ac7fe45", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html": [ + "d0db3b2d5fbce4215f38601fab28a6c0ee2defd8", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html": [ + "8a003515e59c7c9665d5cfd771d04c3691187ab3", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html": [ + "0adab74b2d6b129d7896e0aaac5fd173bb7ed674", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html": [ + "e08377542bac40faf9c6c934ee97bbc7c80360eb", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html": [ + "cdeb4c3ebef5b3395ff4ee781947530dbea4fc91", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html": [ + "285eec2f23074fad466b51ccd04a85da49ef0872", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html": [ + "471e0ea9b10a9a93d3b7dfcf2afa8d01d801ada5", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html": [ + "2fb911718b1d4a770e07c750937c92ae5ee5beb6", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html": [ + "b9fb45658a1819880a3d77aae6ad388ae85fb1f6", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html": [ + "b092f95075512bb2aab94d36e6b3b3461264a859", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html": [ + "f94e877e97a26ce4e8641354a421eaeed0b0d03b", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html": [ + "a6a912a8065e105a22dd6a0d8e61b00c77adbf13", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html": [ + "202e9b88bba53237c1047a9e773cc10fde929538", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html": [ + "8fd0936de9dbdae39470ad3ed1afde47281059b5", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html": [ + "a3dcfeffbefa774a6c8ac915e52b846f95b95e7d", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html": [ "6680d9a81091780fd8797e9fcaacc7bcf7cb72bd", "testharness" @@ -708033,6 +735582,374 @@ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", "support" ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html": [ + "abcc1ef277c94ce31826fd231b2ddb8283062587", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html": [ + "9da73073d730d9a59652dca5c12e767afea6a218", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html": [ + "35dc11b49ccfb29514bc9f17ac28293d6799395d", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html": [ + "54a2764df4da25e187f43598ae02448e92c4694e", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html": [ + "fb3e161a1565d3130be8a18eec0998c27236b6d3", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html": [ + "3219a3a04f1a9afc88929afadaf9129d42cb09bf", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html": [ + "578e2df044dace7f64336aaa2bb00ac46887c2a2", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html": [ + "bb821e04ebc5679825fafc004b2a93f3d0ac2536", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html": [ + "6519e31d8f4be60fcf133b3bc4a9db3d30159531", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html": [ + "fa0935b0d4c4080f3c46485ee7c7452d506f4ee6", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html": [ + "9a0b6cf447c6c3a0d50e0970bc4ba456713bed06", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html": [ + "ffa29b49d8f82d4f3cdd81a6c2cec8779faa1658", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html": [ + "d071ff9c1a24c2f6a076c7e537bd5b3d1efe0f42", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html": [ + "c440eee61208cd4b5908f0e74aa6026b8fd0b695", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/sharedworker-module/same-http.keep-origin.http.html": [ + "a546a5b459550000dec2bfff78ee543cbe110a60", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/sharedworker-module/same-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/sharedworker-module/same-http.no-redirect.http.html": [ + "14d11b8391c07136665dd7ab672cb4a02bc861cf", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/sharedworker-module/same-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html": [ + "ed64f87820898d350ab7ec4dcf1f7bad3f21d6ea", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html": [ + "6debb2df2a6f3e2d4d2f46236c6e6409eb7a0845", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html": [ + "47ac8bfec9c87828229b867008a72c55896a6c93", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html": [ + "1133da5bd32e9038bbf499b4cade178126214fd3", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html": [ + "3956674c8b930c0ecb41469265ca89808684b0a8", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html": [ + "56cf4577e4241d6c1bd01b16d018216d8d404a90", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html": [ + "0676836eec54f70cefa6f99ac7f956b31864069b", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html": [ + "121c882d3641af3cf13c86360e77b603c98541a2", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html": [ + "fed3991b8f291108dde677b6f7a80ee24a8e25ff", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html": [ + "a91d2f97578f50df64e2a1a4bb09504499b9190c", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html": [ + "8cb267dc1513152c3be4036acaca3e8568a48139", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html": [ + "5697af56c536472f9af963ad9a9fa40f401fe96e", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html": [ + "071babf8163828e34c5a6c94df5c3dcb2e6ab559", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html": [ + "491ecf16dc98bc8546aa35b5fb3b8c927b7a5465", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html": [ + "014a1b1842a737f182ae53e2f93d3bdfb4f7a19e", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html": [ + "5b59ec8fcf46997a8a55a1f1a4e44907a9cca360", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/a-tag/cross-http.no-redirect.http.html": [ + "75152e33bd0d8d55120f50857c3aadd039da38fc", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/a-tag/cross-https.no-redirect.http.html": [ + "cce9287c83c6ff0db2bca44732eba3087ba3a624", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/a-tag/same-http.no-redirect.http.html": [ + "04cb817b65da7b19223f3595ca78b4ba97277306", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/a-tag/same-https.no-redirect.http.html": [ + "9f74c763b160cb05bca3950955cd33cb0b5d9252", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/cross-http.keep-origin.http.html": [ + "5ca0f069048b022f685be267d93f93babe3ac691", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/cross-http.no-redirect.http.html": [ + "23486bd4715ee2865170b7dccbdca070a41b0128", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/cross-http.swap-origin.http.html": [ + "828022035a1af0bfd989c9e7dd22e8fbe4516303", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/cross-https.keep-origin.http.html": [ + "2ec65fccfade3fd8a76ecfeefeb2d8909aaffbd7", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/cross-https.no-redirect.http.html": [ + "59574ff0674cad81e49cd376498af54739c12353", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/cross-https.swap-origin.http.html": [ + "7e52ffd6599b037f24eeb4739f4c85bf9844e197", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/same-http.keep-origin.http.html": [ + "90495c0aaa411cb5efb3aceff1090a278b8b9308", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/same-http.no-redirect.http.html": [ + "d73d9fbec33753d0ed77833c921260dbf8f1d714", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/same-http.swap-origin.http.html": [ + "3287e6485e18704fde5443b9889557b976a795e7", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/same-https.keep-origin.http.html": [ + "cc1d014c94970d1a408284ffaee68e459d7c6764", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/same-https.no-redirect.http.html": [ + "0ac7079dc5d632ef71e8575305d05c6dc1696943", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/same-https.swap-origin.http.html": [ + "9f6100714ec33802f706df2af99de3059ef0bbc0", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/cross-http.keep-origin.http.html": [ + "9ad7a08c3317890e24415e1e9112eedfb48277d2", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/cross-http.no-redirect.http.html": [ + "bbf7c023df58fa471ec5556eeea223cbe0338281", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/cross-http.swap-origin.http.html": [ + "19f1b7d7b26957045d866e43a9c5dd77bb011659", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/cross-https.keep-origin.http.html": [ + "006bee035ad602da495578c04f37c2580379d77f", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/cross-https.no-redirect.http.html": [ + "3d7b03876d4139b32b79e4977c2060c1ee674565", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/cross-https.swap-origin.http.html": [ + "3c0fddbeb6b48ab9e6c0538ba391982271c2d82b", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/same-http.keep-origin.http.html": [ + "f7da334648e0330cbc780f17d2c9ccd547180e2b", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/same-http.no-redirect.http.html": [ + "4a8645ea9b925b1b381c4324c7e34812fcefd44d", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/same-http.swap-origin.http.html": [ + "4bcb5a48d83ec2af59b3d8a283920cef1f12f025", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/same-https.keep-origin.http.html": [ + "59716636463009426dee3dfeb4b2039b25626ba4", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/same-https.no-redirect.http.html": [ + "7ad0bb08359fb23572ebc3e0cd748f186e1798db", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/same-https.swap-origin.http.html": [ + "ebe0978dfd27f326323c66aaf1c2deec05819e20", + "testharness" + ], "referrer-policy/gen/srcdoc-inherit.http-rp/unset/img-tag/cross-http.keep-origin.http.html": [ "f35f4f9d62898a9d45114090703ca2ca468102ac", "testharness" @@ -708081,6 +735998,246 @@ "761bffa81c557369ccc88c2efd8f9e2280064d2a", "testharness" ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/cross-http.keep-origin.http.html": [ + "48a68a2d4b3058021116870798ee429ca81fa4e8", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/cross-http.no-redirect.http.html": [ + "a890c6e957ac5f4328dc56b48d5fddd1af3b1553", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/cross-http.swap-origin.http.html": [ + "16b4615a617ce28089390e7c92a0f0343e37ffeb", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/cross-https.keep-origin.http.html": [ + "fed78b9665110da04827d3841d803ce4e0011efa", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/cross-https.no-redirect.http.html": [ + "663bb84817946e75f708fba279d8063823c135fe", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/cross-https.swap-origin.http.html": [ + "fa5d0191afa819deddb63ac40810d86c9e06f248", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/same-http.keep-origin.http.html": [ + "0b18ad9dbe85ab94a925850b98b19ba1fdea242d", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/same-http.no-redirect.http.html": [ + "be4e33824273ff6c9360034a94a3f6e75f606b87", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/same-http.swap-origin.http.html": [ + "a6dd2d87549d0884290d55cf580b77d8422070da", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/same-https.keep-origin.http.html": [ + "a14956b1556269caa2ee93aca089272db93b40bf", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/same-https.no-redirect.http.html": [ + "d273cef1be798095237038c501a86ab1e06a082b", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/same-https.swap-origin.http.html": [ + "dc18808d7b32f1a2da745f7cddf2ff1bc0480808", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html": [ + "886ddaaf001ba36417f6033f4e4908abd458ea92", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html": [ + "b85408449590c3d966bcf849df9eb503404ac690", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/sharedworker-module/same-http.keep-origin.http.html": [ + "3c7974c0570bcb89b801290fe7238fef3ba687eb", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/sharedworker-module/same-http.no-redirect.http.html": [ + "ed0397be62103acaa450b55f3d04bc36d7bfcb98", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/worker-classic/same-http.keep-origin.http.html": [ + "b5b54ff3db133d7388b4fd8b44391f1d48615ee8", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/worker-classic/same-http.no-redirect.http.html": [ + "57c8036d10ef8395f1d1ac4e013f71666bb6d3eb", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/worker-module/same-http.keep-origin.http.html": [ + "de8ff3735f59ddf41ed195a94c82c10919c68d69", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/worker-module/same-http.no-redirect.http.html": [ + "16ca268c59faaecbd0d1ccd4482fa79576f2b818", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/cross-http.keep-origin.http.html": [ + "838b4df0c18717184868573cb40428e9d3973e16", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/cross-http.no-redirect.http.html": [ + "731181dc00553786640eac74e62074f1f4352c82", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/cross-http.swap-origin.http.html": [ + "370c65707ef776165926e7388242091dc7249d0e", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/cross-https.keep-origin.http.html": [ + "a8f8c47ae6551bb1ff5c87b49839ac56ca9b7e9a", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/cross-https.no-redirect.http.html": [ + "17f88a23e07d49bcb5b4d7b588a07489d4aa12e8", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/cross-https.swap-origin.http.html": [ + "d6da2ac72b228272b3de8e3c6899d6e0e5273d19", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/same-http.keep-origin.http.html": [ + "6871d18525031703f3569231a1c983c78fc6821a", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/same-http.no-redirect.http.html": [ + "98dcf64e4b959f2314ca43aba86cb2126645e78f", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/same-http.swap-origin.http.html": [ + "881bbe39e44ce07d31adfc6eaa34b8a1965bc967", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/same-https.keep-origin.http.html": [ + "0a9d535a24922c8ca9c28a9836e247c1b6511822", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/same-https.no-redirect.http.html": [ + "cafcb65bdd3ac8c753e2e20e4b7d94f8399b58be", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/same-https.swap-origin.http.html": [ + "b3542367e8a4b04b38a5350140d404555fdd780a", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html": [ + "01c3cd00ac3b2650ddcfc0d6e23ae07b280ffa87", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html": [ + "6956c15c53efc1f881528dc94d4bcdf7c8938e42", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html": [ + "9b5aa0701a2525daa2ab9a471701878ec11b5163", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html": [ + "f99ce37a558d38f89f800f681f68c0b5d79adfee", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html": [ + "97ec6a5136199fbd89c43e896e214603996611e5", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html": [ + "1d1e4b73c3d54e4b6578289f444460a1530cb746", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html": [ + "f3d5596e0bf4ec5b0751fa93b2ad48336cf395fd", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html": [ + "3017305a91d9e5d23f1a6f397f675cfa535e4fbc", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html": [ + "6fa5feefef0b2d33a06edcebf4407d0a70444662", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html": [ + "20624a774424e804dbb12ba50b55789c9502070f", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html": [ + "ff4cae16582521fad8db200100694e447dae3946", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html": [ + "69b4468abb4f7aa80f1c4e7d7e09fc28c1e8214f", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html": [ + "207c305f8efc0812e9faa45dd1ceb6bd0bcf1d43", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html": [ + "5dbe8d96ef8e63b9a4ca9b4294ee3b02373391f8", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html": [ + "77b267f98c265baa09fc830751667d24a189e453", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html": [ + "1f3e0bfde07fa4efd39476aae7845678b936b4a8", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html": [ + "093da149d8d2f1c2acaa3c9724d1085554491e40", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html": [ + "226f62653960b083acd7fc3d194a33676770cf61", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html": [ + "c2a2fc683189c3e56a21f1c98ae1d2028b240046", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html": [ + "be5798a4b3dbfc37d1665749363c72fe33fc1f5e", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html": [ + "ecaa8bf9df351699024c97bc28473b3c560aaa0c", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html": [ + "f4fc1c2e7e57ad6223efb09af16f8265ee27c247", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html": [ + "1124a5043d18f8b9937e0c1d5b25c90bf3fbcacd", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html": [ + "dc0173e5260c6117d4d4295ef213c142cc623173", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html": [ + "4a881a14a150e3e44a15a9b143e76c88a5ca1bc7", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html": [ + "ad2890122fb4ab73994b8398a29e7decc8a1381f", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html": [ + "58de421ca79313053c9cd8ad966d39722f0ac6af", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html": [ + "dbfc78fa4260219088eef5efb3fb2f494fe7b4a4", + "testharness" + ], "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html": [ "2950bba1a75e645068b2f57df444b90695be2f39", "testharness" @@ -708129,6 +736286,246 @@ "7c06426b42e736027e4cf31c941f0fdb5d846a43", "testharness" ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html": [ + "635fe10a03b4e86bf67f7d4f0768ee508f1aec1e", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html": [ + "1e8352fb3217e0a66ad9a4f911ebcc877f2b1f17", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html": [ + "c82f6d362668b6b553ccf2796e9d63603227f379", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html": [ + "34e237137ccde54fad67f8d8690955b921b3de3c", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html": [ + "a38182aca391785c97837bc2efaf06e6060b5887", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html": [ + "973faa65f67d03ca740d410c29130a7f0649b94e", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html": [ + "a27be45a16066e638193d877d66ad25160099310", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html": [ + "f24db266d87ce3dd5cf6679698dca001f7088872", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html": [ + "e68e68a1f0acc065f78db2f6d04c981024317dcc", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html": [ + "add3d6230388c4ef35e51f978977d74e0f8c0688", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html": [ + "99a3d33e332ef28f3e6d482c4d8d9aafe463a055", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html": [ + "6ebe6e7946f99a37e477f749959750aeb864d3e3", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html": [ + "aa49f7c5a15aca278517f6bf47abacc18d0e58da", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html": [ + "a2a4ea8a2e10791749407647eb3253633cb900ef", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html": [ + "0f25791aa606c2d660b7907ab80787221671202c", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html": [ + "90c136c585822260664df1b7b98a72ee002423ae", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html": [ + "116574047e71e87a637665275e467a88ee6f6127", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html": [ + "609ba3e9fc4ae087c5bc785b35834766fb23c72a", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html": [ + "c09f9d91a7e3dc724000753994515daa1833e8bf", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html": [ + "76733a3980a746c03378e9802356d3080fb1f83e", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html": [ + "3f60fe0c76bdfd8b3bb998607606a92160483e52", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html": [ + "9fe50942bb7d059d689f36ae59cf643003647ec1", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html": [ + "2321fca08c6248a29c332bdcba299463d2c2c4a5", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html": [ + "b31c62755a1716619235439f90a41f8c15a28cdc", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html": [ + "6671b400ad289bfcd8fc82c2fce7ff797850d6c6", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html": [ + "c94c3eea23a11c0d3445ddb3d4007da7d386d594", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html": [ + "2458c5a9cfa58035e0bbb9281116bac281e22550", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html": [ + "b69f1d55d9d069aa4d652e45016e344dcf53f087", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html": [ + "9668e8f6a8b56b30890ae1ecb976c8f1a55908ba", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html": [ + "3f915feb04605671deef43a2ab81dd8c5b2473c8", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html": [ + "67d3f865c0729ab2d254ada7a9ef9e085694ec81", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html": [ + "b32cb708d2f5dd5f165c66bd732ea0414f6d35c5", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/a-tag/cross-http.no-redirect.http.html": [ + "ebd8d26311c82d36eacb0826507414a892abb22e", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/a-tag/cross-https.no-redirect.http.html": [ + "7f94326a3a366f865ae677a5955dfea066186d89", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/a-tag/same-http.no-redirect.http.html": [ + "d67d0cbb2ac7c2039451e83e885191840af241ea", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/a-tag/same-https.no-redirect.http.html": [ + "933286a3f365d83c34f85af661c19b63e7d86e9f", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/cross-http.keep-origin.http.html": [ + "5883de09c21641b50fe058826e6025335c56fbcc", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/cross-http.no-redirect.http.html": [ + "f37f4ad218edb3c58be3f53ff309777884a8a1fd", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/cross-http.swap-origin.http.html": [ + "f0efb6418dce485870b0714eafe7fb8ba13cc46f", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/cross-https.keep-origin.http.html": [ + "a85a6a0750c074f61eff3431976c5381a56df6a9", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/cross-https.no-redirect.http.html": [ + "03f7a91641be1adbad192049edb86674a6a44381", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/cross-https.swap-origin.http.html": [ + "bacac0742a04cab5103e7350f9fdd6a9dd7eb821", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/same-http.keep-origin.http.html": [ + "b652986a7d73f3c732aa083b515bfff2bbe1dc61", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/same-http.no-redirect.http.html": [ + "139bf5bb3fdeb62c694c027c2cda2e7a72bebd30", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/same-http.swap-origin.http.html": [ + "c2c4e5af05c870c4ba9bda46e5f7c5f1216ab455", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/same-https.keep-origin.http.html": [ + "e2515f98729257ee739a0231cc7fbe442a97edee", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/same-https.no-redirect.http.html": [ + "b5de4be3654cff7aa41440ca99dc2753cb49caff", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/same-https.swap-origin.http.html": [ + "2814386075c33cc6c9bdffb44f533124868e3884", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/cross-http.keep-origin.http.html": [ + "168063fbf9a6cd0cfe12084e397774f7fd1fb61d", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/cross-http.no-redirect.http.html": [ + "b1975d72eb2a3f8dc561cbb603459a6b158bcdb9", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/cross-http.swap-origin.http.html": [ + "36ce80b3096e2f696a4e5aa1702adb1fa0159d60", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/cross-https.keep-origin.http.html": [ + "1f32960a8df6799a26eb3979f804a6a09d937e5a", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/cross-https.no-redirect.http.html": [ + "4c4350d4e6d232900c92ca226af29e3c0a50ec97", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/cross-https.swap-origin.http.html": [ + "f93566ca5f87e45a465424d0370196ecdca3191a", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/same-http.keep-origin.http.html": [ + "838f2d5777289af062867c7de7b9775f019a55d2", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/same-http.no-redirect.http.html": [ + "4048956269e3071e411b74c5ec38665eff37557e", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/same-http.swap-origin.http.html": [ + "5a87c2384cd7067f1403792886ee2d5efbe02bf8", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/same-https.keep-origin.http.html": [ + "1f3041d92083cf82ae5afaea3fb6aab6fa5d8436", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/same-https.no-redirect.http.html": [ + "9c37ad07c07f4cda5d6709605dc8055e29e80aa3", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/same-https.swap-origin.http.html": [ + "be86732ab157d8d0a9eb73df42f17a5da455d67f", + "testharness" + ], "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/img-tag/cross-http.keep-origin.http.html": [ "0e0cd8f42096069769db6d36a933297809058991", "testharness" @@ -708177,6 +736574,246 @@ "fef59b4619869715c29f0aca220ce1cf1b1aeaea", "testharness" ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/cross-http.keep-origin.http.html": [ + "a659839d938fc40ddd1e4d2ac8c89a17a82713ee", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/cross-http.no-redirect.http.html": [ + "d4dfcec21b8e55ce4987ceadd11d66e5cae39a27", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/cross-http.swap-origin.http.html": [ + "992926d69cce8aea6a5a709261fd963341c04d18", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/cross-https.keep-origin.http.html": [ + "7160935f41b3b888545736663cdcbaad343b5ba3", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/cross-https.no-redirect.http.html": [ + "270e8eb9d8a0146bd5e138d3be85ee771409cf76", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/cross-https.swap-origin.http.html": [ + "c0a36e09ad9863e310de19318ab98259a96c0f8b", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/same-http.keep-origin.http.html": [ + "9f5c9003c7fc8ae6f898931c71c64b83b9174ac3", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/same-http.no-redirect.http.html": [ + "8393abf65929c128f21c4f3e9686760539ce9b6a", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/same-http.swap-origin.http.html": [ + "a840371be16d58c836503ec76d67e5f945150f56", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/same-https.keep-origin.http.html": [ + "f71589d316024abdbf6f9d713499aa0439af7b2c", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/same-https.no-redirect.http.html": [ + "29af0c79573a71001e2b9f2c8c7b4ffea0d926d1", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/same-https.swap-origin.http.html": [ + "67fecd3902b157c7b9a706255e7478d531e629b9", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/sharedworker-classic/same-http.keep-origin.http.html": [ + "a7c3ad4d1537f999de67679dcbed5478e4e403af", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/sharedworker-classic/same-http.no-redirect.http.html": [ + "d3e10bda96ff6abf8af7a33e026d7fb926bbf08e", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/sharedworker-module/same-http.keep-origin.http.html": [ + "f4ebaef4d2d69b04644df9e3a880eb46664ec33f", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/sharedworker-module/same-http.no-redirect.http.html": [ + "ab11b76cfcb886c4134b485b9ab86d75fe1c6dc4", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/worker-classic/same-http.keep-origin.http.html": [ + "4c05c9789857a040ff977ffd1e2df17a26df9d43", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/worker-classic/same-http.no-redirect.http.html": [ + "9a0cc8687b5545360cf4a0994732d8cf4125b2f4", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/worker-module/same-http.keep-origin.http.html": [ + "7da2ce41bdb21c37fd0a7fc71d9c90eb32272696", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/worker-module/same-http.no-redirect.http.html": [ + "fb17b99ba3009b08098f9137585419609ec4e679", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/cross-http.keep-origin.http.html": [ + "7873f3748a14a701b29461cdce7c7c54926e4b3a", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/cross-http.no-redirect.http.html": [ + "71c0c3d30993c178e4efb23edb3a1788ee351150", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/cross-http.swap-origin.http.html": [ + "2e265f986002e7ff25e89f6ab880347aedae5d01", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/cross-https.keep-origin.http.html": [ + "5a52fcbd37dd48b22545041106eda8b322b83aec", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/cross-https.no-redirect.http.html": [ + "e9c22f3f5419c16275aff9e74eab3507c18a6509", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/cross-https.swap-origin.http.html": [ + "86fc2a5dcc5c3e0742aafe278c3ce9942cea0726", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/same-http.keep-origin.http.html": [ + "376106b37bda7b98ceaf8e5d6030906c4c347511", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/same-http.no-redirect.http.html": [ + "d3bddc68becb8b586948d471a9deb24d653753c0", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/same-http.swap-origin.http.html": [ + "eb9c34556d6bc4502a7c7d5fc2f02f4f340cdc74", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/same-https.keep-origin.http.html": [ + "cdfe8d2d37e44c6f0e09df936958b9f3c837f5d2", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/same-https.no-redirect.http.html": [ + "7f60142913f7b493aa42f2af0ae09430fb27ff1e", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/same-https.swap-origin.http.html": [ + "9aebf625a540106d4db72a0b8ba64dd135bf025e", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html": [ + "1f24ead35120261a879b52fc254ebd9981203adb", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html": [ + "dbb2d98a72bf6185bee932378037fce5263b15dd", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html": [ + "f3885bb941ae3176ea6dbd197ea4d6fdf49f548f", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/a-tag/same-https.no-redirect.http.html": [ + "49717dd22b4ac10b12c3ea555dd771a778773c7e", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html": [ + "0b24369e0a0243b0f084ccb524b5e8fc1cd5be86", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html": [ + "e58c9c7fc14646f1510a16c315a923161476c41b", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html": [ + "0ff47238f01a94e5c3d6d8d5df1d79d85f071bbc", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html": [ + "c6afd81f51937770056c7585b7052696055b44e7", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html": [ + "289acf0171b7705f2435d041217d9fee165c47a3", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html": [ + "c1779de76d2dfd49c40f1587fc5c0cf105f94bfe", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [ + "527730156d231c0680b3efa91113e767caacd729", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [ + "69314164bd38d80d138a8d7cdb75f9a4a44ca5e1", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/same-http.swap-origin.http.html": [ + "02aa00409c2ab604a9e550429a023fe50f3ecb62", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/same-https.keep-origin.http.html": [ + "314a2139a412bd313ca01e881781c970600aeef7", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/same-https.no-redirect.http.html": [ + "605932ba8f6ece680d53a08ec017ae34014ab5db", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/same-https.swap-origin.http.html": [ + "71eb624a1203535369d21f800fe92c18cf5d2985", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html": [ + "2a110c9df283d7d3b8544aa4674e806010b1fb3e", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html": [ + "8ae166f931f3b3828eec24e362113d10089e4190", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html": [ + "591c1bb2a4c31f2a4eef515a2e0cd4f3ff3607ff", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html": [ + "e5688042c7e71b64c84918d695f7243d11021e10", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html": [ + "ad0c432ea268b737da5d5d19fa9ce6c198cbcc2f", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html": [ + "861ebd39ecbc000c9dfe36f5434de942810e4ad8", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [ + "4925ee28bd4607936e6c98bcf7cfa3421934b9f0", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [ + "bd0d7159c7493418890cf7e9a740b94af0c28bdf", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html": [ + "5d9a63918c84666af8a0c984c670fe0ff87570ac", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html": [ + "c2c2661082de24c63b72f8f643e09ee149544e47", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html": [ + "0b462d709f33f56405cd258e0537bbc44f5ced92", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html": [ + "08782c17ab5c8658f7a9732cedf450b7dcb94c1b", + "testharness" + ], "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html": [ "0b3d4a144e1e3d3745860b87d5dfa98ded8b4f3c", "testharness" @@ -708225,6 +736862,246 @@ "d9734ad707a3fd4cdfe1befbf663d60fd811aaf0", "testharness" ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html": [ + "9d72ec610a18b7c7c9b030b6c0804de87c36d97d", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html": [ + "e7d7fdf4f29c32dfb1c8b25ab594d491d000572a", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html": [ + "e03720044f520c77e57ee3e4cb2b0f891c7c765c", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html": [ + "1946c908c978d67206b4a698b9157b62f44ba304", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html": [ + "e2f254decec8fe5ab5e07e21074f7c5cd2cffc21", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html": [ + "48d9eabae6387093ae99349cf3c7a5d9433c6085", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [ + "fe866a17c27434a80541a65b5ca82349a61f922a", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [ + "56e5a5de641f62d6cc665e60e5f7b625b8c2c1a5", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html": [ + "27a64353e003abc7a3e27c96c578189a4f7a1f07", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html": [ + "5c4733e5b969b322a31ea171f62c4b92dd7141be", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html": [ + "0cd3141bfca6f003a0d9f0a25235d4aeea284914", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html": [ + "d4ba20b5d5121429faf42001b34f0fabef29e5c6", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + "8aa77e96165c2f94b5b9de37b10a90a603d3320d", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + "2c2400abadb084eca2f35569d1ce27397610289d", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html": [ + "80670a9a6505eb4b40ac40eba74d01861538864e", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html": [ + "31cdf445c054b71cab68ff170b20b02043d54e3f", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ + "ff8a4047ffa3a70d2faadefe9dae9c3e518aaadc", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [ + "6c8e0fc229267ea573ad1909e0fa1d00256948a9", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [ + "bf6c431351f8066609dd1a7b349d65aa60071e11", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [ + "d993d4dcbc6a302b2954e2fce02d51b2e7dafb40", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html": [ + "f8537c6550df1f204d9cd1786e77715a935ee444", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html": [ + "dfdefbf94c99d322d4380d9dfe51674b6979eb93", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html": [ + "1775abb14fc6dd0c7eeec687c78d052736412e82", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html": [ + "41420b2751b3f5886620300ef4ad64410efe6f44", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html": [ + "b7f2bb1f599e04072e55e0610882732d18eb3907", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html": [ + "7d462a11630d1072e90a118bc6101a042d6534ac", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [ + "7121f603b544d14864f781fa0abb414e7e5150be", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [ + "9de3141b0ddfdf81121f020465f07e3994172458", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/same-http.swap-origin.http.html": [ + "c362bfaebea1d67f14b2074d8cd42823fb2cec09", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/same-https.keep-origin.http.html": [ + "7341f6dab1b2ab16f0274b7941f463dea211c7de", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/same-https.no-redirect.http.html": [ + "3c20985e0e8ac8fe6e4c079d852a88fb2a5d9f22", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/same-https.swap-origin.http.html": [ + "6dd235679dc40fb44ad0c41a38e051d4329348a7", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/a-tag/cross-http.no-redirect.http.html": [ + "426b0c3d200a1945a36657201c017b9523c1c595", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/a-tag/cross-https.no-redirect.http.html": [ + "a898860f394123da15a23c39795e73ecae82146f", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/a-tag/same-http.no-redirect.http.html": [ + "280c500bdd495d916fecba64f801cbb9fc3f6072", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/a-tag/same-https.no-redirect.http.html": [ + "cf53a6de705c897820f4f97ee714ddfbaa6c1381", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/cross-http.keep-origin.http.html": [ + "67391df90eaddf07e8d9f0b87af92744a07f44d4", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/cross-http.no-redirect.http.html": [ + "adcf86e36a130a91bb479eada7c9bed9aab55de0", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/cross-http.swap-origin.http.html": [ + "d39c3b9072737232bea3268a18ff69b68ea41025", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/cross-https.keep-origin.http.html": [ + "075a6a66fe439ab1b5cc76850ddb23068f43725b", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/cross-https.no-redirect.http.html": [ + "19f875a404cb10f2d2bae70a0b5c7cd40b06837a", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/cross-https.swap-origin.http.html": [ + "eedb48ff7a6ebeeddf71e5f1e50fcf157fea9013", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/same-http.keep-origin.http.html": [ + "df3f3fb461488fc425c68a50710f34147b214452", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/same-http.no-redirect.http.html": [ + "8bce19247c689d11dae58ad416050a3665fbbb55", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/same-http.swap-origin.http.html": [ + "b1128b68742f72bd51a58685cd4d1fbfb3e1bb30", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/same-https.keep-origin.http.html": [ + "d92756d2bf3c0b4a06897bde4cb4178f099f2143", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/same-https.no-redirect.http.html": [ + "3ad4747f8eb5c0549b3b60dbe5c198655275e6e0", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/same-https.swap-origin.http.html": [ + "40aebbfd11f859c0542d486cfcf837c4019d929b", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/cross-http.keep-origin.http.html": [ + "cc57e2cb2af7486ab77d39dc25c2171b97aa62cc", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/cross-http.no-redirect.http.html": [ + "86619c1b965bffd50ac418dc42473179d46830f9", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/cross-http.swap-origin.http.html": [ + "d6630a346d879fe9388f584f7a03044116a5560e", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/cross-https.keep-origin.http.html": [ + "2def8f126e3758096b6c03b3aa0bdec1009f5076", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/cross-https.no-redirect.http.html": [ + "7b104f15b05fc328264840932a1ed822c48463c8", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/cross-https.swap-origin.http.html": [ + "3c4c70946d899a860f6cd6bb2b337257407c8136", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/same-http.keep-origin.http.html": [ + "905c2bdf1cc32ae31579de0d164f4834cd95577b", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/same-http.no-redirect.http.html": [ + "6592cf4addf0ff9db741d4aeeefb5b08968cb5f7", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/same-http.swap-origin.http.html": [ + "34e982568424adb5cd7ec4b3fe4eca1f623352ff", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/same-https.keep-origin.http.html": [ + "4b3757cac06ead2787fe545dda600c5bf4fdb166", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/same-https.no-redirect.http.html": [ + "415b8e0f0b332085dbf53dc341d862af39e27412", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/same-https.swap-origin.http.html": [ + "33de474a8e6f2921ff9a90a41634e5ae01602fda", + "testharness" + ], "referrer-policy/gen/srcdoc-inherit.meta/origin/img-tag/cross-http.keep-origin.http.html": [ "6c810a7a7e0806c877296d3a3a83084b8202dfe8", "testharness" @@ -708273,6 +737150,226 @@ "0eb837ec08bfe8347f0bc501a2f6f38e47c821c0", "testharness" ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/cross-http.keep-origin.http.html": [ + "971165042572ffa738d0e4f33b7f96df533fe7e4", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/cross-http.no-redirect.http.html": [ + "5ea767bdd29ae729ff59e03fe1e485bf3412cb51", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/cross-http.swap-origin.http.html": [ + "1d4527e3a7e1b85ae1a813f2714b3562f3f6a727", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/cross-https.keep-origin.http.html": [ + "6a554a20fe58844822ec7e6f2bd8a8c68a7b6483", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/cross-https.no-redirect.http.html": [ + "e949b59ced28a9fb36ef419c3ba6373f79786529", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/cross-https.swap-origin.http.html": [ + "49b5c18de45cef34fd98817747151f99af7df4f1", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/same-http.keep-origin.http.html": [ + "aa6dba552b7b5c6b575e1c1d0b99926a9659c1f2", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/same-http.no-redirect.http.html": [ + "dd20864228acd5022ecf1910ff5b60d88bf6067c", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/same-http.swap-origin.http.html": [ + "da05a20b368017ecafb05ec7a873b9c3680b6886", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/same-https.keep-origin.http.html": [ + "3c432d077deb8340bcf0d76ddf44b2daa51453c2", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/same-https.no-redirect.http.html": [ + "70b9c6d4b6fcaa2819bb0ffda283c4285cd7fd01", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/same-https.swap-origin.http.html": [ + "beb90e1dd8b93a30f52b887d6e2424eb9a17bc86", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/sharedworker-classic/same-http.keep-origin.http.html": [ + "3bbec514f996c9bf385f5eec78969f9ef49c8441", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/sharedworker-classic/same-http.no-redirect.http.html": [ + "a1494ac33075731278a5b286703bd1766df1b150", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/sharedworker-module/same-http.keep-origin.http.html": [ + "04bc91b9433f657d855f6dcaac3c9b36b7bfed9e", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/sharedworker-module/same-http.no-redirect.http.html": [ + "1939c3d7cb02541b4c169c6fabbc4db2424a6939", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/worker-classic/same-http.keep-origin.http.html": [ + "71743d9e6d72671c2e78ff8a10728e06c60664e7", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/worker-classic/same-http.no-redirect.http.html": [ + "361d9eb32c56642edd0f07c843e799b0181be393", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/worker-module/same-http.keep-origin.http.html": [ + "20e6ae7b87213f3dde96f1f25eb36a182b8a4ac3", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/worker-module/same-http.no-redirect.http.html": [ + "609672be73b9841fe5dc58b7388ba4f6a39f8410", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/cross-http.keep-origin.http.html": [ + "f5279e5447db3d383be8651a4861d5417da2aac3", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/cross-http.no-redirect.http.html": [ + "7cf80cf7470d92141629eef552c3010a071d8c9a", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/cross-http.swap-origin.http.html": [ + "c46f3d223439470ebfc89ec68a1e4511c9f780e4", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/cross-https.keep-origin.http.html": [ + "d3bb446c91592eabc8581c252a8be442979f6e13", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/cross-https.no-redirect.http.html": [ + "0f74bd796794c862532167c5fd2de36cac5c50ce", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/cross-https.swap-origin.http.html": [ + "c357bc42efe5d66a1fac445841d2c1cc42ec9b28", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/same-http.keep-origin.http.html": [ + "39a76f815b9b711398725f0459af9727d984735b", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/same-http.no-redirect.http.html": [ + "cf9eb7e2dcb1eff215faf6210b55e978210e7b81", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/same-http.swap-origin.http.html": [ + "f53ba9b55e5fbe4c070b0930767bbb91f34349b5", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/same-https.keep-origin.http.html": [ + "e43e0716ce8eaebfc691ac9e7e00e732615a8a8d", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/same-https.no-redirect.http.html": [ + "b9b5868de66014e78ff29c2830fb553121b09660", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/same-https.swap-origin.http.html": [ + "7dd9852a682c685b65542883e04af1bf4db19e58", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/a-tag/cross-http.no-redirect.http.html": [ + "425e5c8a2824125543a3d5abaf023315249a01a7", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/a-tag/cross-https.no-redirect.http.html": [ + "4a9b6db2c6ddda1f68bec9bf1b8b7e2107a521fd", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/a-tag/same-http.no-redirect.http.html": [ + "3e11596560cc2eeec4d34e2293e3af19f15437d5", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/cross-http.keep-origin.http.html": [ + "e89e312c1503b76c7f0714019f3b8417e72279a3", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/cross-http.no-redirect.http.html": [ + "6fd63aa6dbbffd6a2dff38964214a74e2ecfb7f7", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/cross-http.swap-origin.http.html": [ + "99f743bf4c2e261efda178feea6bc71578fd88e0", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/cross-https.keep-origin.http.html": [ + "39d6c82e55e075bf780fbc3656c775e21b06a1b3", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/cross-https.no-redirect.http.html": [ + "62c058f308b71bba4ebc18ba1a88a088f6b088f2", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/cross-https.swap-origin.http.html": [ + "6d9a60f9a81782480be207c27ddf7e264c320b5e", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/same-http.keep-origin.http.html": [ + "6dbb3e3ded34ac1965805bb71c0eadec2b83bf18", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/same-http.no-redirect.http.html": [ + "90a8ac23c56e1f3d85d03bb86c308425bd90f4cb", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/same-http.swap-origin.http.html": [ + "2bd8354d72ceb5fd87580f2579a48477c73b8950", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/same-https.swap-origin.http.html": [ + "83f0eecdb82de68bea58a3688ba4999d10684c3f", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/cross-http.keep-origin.http.html": [ + "00861bde442a9afce67b9003523d4136b24d0581", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/cross-http.no-redirect.http.html": [ + "d2f1c473c004c047cda4718cf9dfe07e369ccf97", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/cross-http.swap-origin.http.html": [ + "42f79a742adc6ea6816a3c5abc15d63b53ad0210", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/cross-https.keep-origin.http.html": [ + "0056b5ca051a2e4fd9160a99926c5f8b1f6485cf", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/cross-https.no-redirect.http.html": [ + "1be34e77987dac2e461e9733f17035b7e4dd27c4", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/cross-https.swap-origin.http.html": [ + "421386b14e416e5eaa6770e0afc36f38f13e1faa", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/same-http.keep-origin.http.html": [ + "234c45f3b1c90ee6af200b786ac7c0f475095ce5", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/same-http.no-redirect.http.html": [ + "a4e0e8f79dfe0efaffff7c86d86fda07bb61fab9", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/same-http.swap-origin.http.html": [ + "255d40751a07b804a86e6f842c0c7c8d9c057d3b", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/same-https.swap-origin.http.html": [ + "1b86baa128867827cf0cff1498e63fbb3675c7ef", + "testharness" + ], "referrer-policy/gen/srcdoc-inherit.meta/same-origin/img-tag/cross-http.keep-origin.http.html": [ "882e2bdb30c86735b776f458464b89bdd5e6583f", "testharness" @@ -708313,6 +737410,230 @@ "a8919e6e6d62e7156aa1ace5b33def6afb067986", "testharness" ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/cross-http.keep-origin.http.html": [ + "ed4480b575e587e37232708c1b7cdff745e13477", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/cross-http.no-redirect.http.html": [ + "8b0f0837d180f9d712f6178b5112ba40cb5c8b81", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/cross-http.swap-origin.http.html": [ + "2a481a7b2a0b58c31fca8561dd8cb623f8b1bfa9", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/cross-https.keep-origin.http.html": [ + "0ce834419db4671d959e80a08c1eb93f8f8a413d", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/cross-https.no-redirect.http.html": [ + "e30407c766d138d95a6b93f34c7ba549a3041a2a", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/cross-https.swap-origin.http.html": [ + "f208e2f49bbcaeab435318275ff5b3d32ab23fa7", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/same-http.keep-origin.http.html": [ + "7375c854d909b5c2d728d12d855a40c7aea7b5e4", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/same-http.no-redirect.http.html": [ + "352cda2bfe870afe5badbb66327de92e4d7c50c9", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/same-http.swap-origin.http.html": [ + "0878e445160659e29ce4f0d1dfed7f6347b6feb7", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/same-https.swap-origin.http.html": [ + "42794f6e5827b60a6d9021c43d2907ede8f5cfbd", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + "0be5078ac43656df596b2e51abc023a1be9c36ac", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + "fff3d17cd6df6ea3e83a60930697187af529a77b", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/sharedworker-module/same-http.keep-origin.http.html": [ + "a9aabdd67ad62b0fa6e3abbcffa21e3f55e2852d", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/sharedworker-module/same-http.no-redirect.http.html": [ + "eedb0686518eacd440d0f4bff97dc63d2aea733f", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/worker-classic/same-http.keep-origin.http.html": [ + "67fb316844dd02e8df174c92d7f80e7c414212bd", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/worker-classic/same-http.no-redirect.http.html": [ + "a8f39b9aee8253d4ec510bbcaaab4330b4ef5ec6", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/worker-module/same-http.keep-origin.http.html": [ + "26983fd03507d522c874d4e35358985c4894fbda", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/worker-module/same-http.no-redirect.http.html": [ + "716b5422e488ad9b550509407ef8ac1af8c7a638", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/cross-http.keep-origin.http.html": [ + "1914308d37e53838dbffb07ddd04fd8f213f3d5a", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/cross-http.no-redirect.http.html": [ + "d70bf438d1c7779ce9fe1b994acb7e91f9274fe1", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/cross-http.swap-origin.http.html": [ + "919bfdff85be418265b1e2531e0e7be5e19a3de2", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/cross-https.keep-origin.http.html": [ + "8a87bc63e26a76d2f266978fd669018f97f32e0a", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/cross-https.no-redirect.http.html": [ + "b3e36809b504dd0338b70ba2ba8d87fa396164da", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/cross-https.swap-origin.http.html": [ + "0bc184ed3483c5e0f55927919868f671877644f3", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/same-http.keep-origin.http.html": [ + "b6b0bcbb75ec00807b64d348e532008d7ed16db3", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/same-http.no-redirect.http.html": [ + "02b58eb7ef3065554c98d0b15d2557d121c90eff", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/same-http.swap-origin.http.html": [ + "e0d15b974b91b7a860ddc61c3acd14a3f03a8883", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/same-https.swap-origin.http.html": [ + "5a6535706f0217fd07d99850a067bfec5807d337", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html": [ + "f15c356532516091baa5cdc3d03960ecdf926500", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html": [ + "2e7289007bd82040d944e18fea7aa4d58318efbd", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html": [ + "c1ccd4d634d77f83b9364f28d60fce56c806ae53", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/a-tag/same-https.no-redirect.http.html": [ + "009f656cf6c07b4c1e6627acc296d526e50361fb", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html": [ + "4d137c1e5d3d6b7d2d2fd58693b4cc9819ff8ff3", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html": [ + "b369548fdf8689b463580b39cdb54e19ac2fe801", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html": [ + "baf694d81298a1c2eb44c5174a9e04bea64f76c1", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html": [ + "a70e3e062dcaeae700d28b980cb12ed891446f30", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html": [ + "75216f2bfc835b2685e0fb513fa359a7fd274b51", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html": [ + "956eba230b0fcf8f6d8b8519363f9641a865abe3", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [ + "0258302d058352f7035c5d1fb310cfca54f1d8d8", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [ + "9503debc1405c0a45bf0f845ca6cc0e830a42939", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html": [ + "2e3a8976b6d0210108acd68669ac31d4de7ea2a5", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html": [ + "85a7e1fd7f8ddd4b569caacd073f95ed69550af3", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html": [ + "201cd08f6a229edcafb4f6689c986e265a38bc0e", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html": [ + "95fb03df670751a4333d670a7e02c9c425c61611", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html": [ + "cc19a77152267a27346b080dfa3e534bc56b25f2", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html": [ + "aa5ba3e61019d8bbdfbf26d6146e9df4f415c6bf", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html": [ + "43bd2ef2e76ca5070e85177c83dbf93dd40b0a4f", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html": [ + "ed85afeb38cb2dcc60edddcadd10e11093d0c404", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html": [ + "b0772be89e7891574757c98edda379e8600f9b9a", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html": [ + "ee2d19666e3e032a9a1ac1fd0658c0c1f1d99246", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [ + "9e1a69ca450679b1f3abcea240734efbd25b45ec", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [ + "aee475dc39425ff17d7c1b15f6b73319a4a11d4b", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html": [ + "3d744918425da8525f79dbfb71940f9e71331924", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html": [ + "4cc6f13922c4e49f68a939646af12bd27c8c76af", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html": [ + "e9cb6147d15135d45ec113519c50a93ffb037506", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html": [ + "890e4ff576c70f337c15427f1c62153bce676800", + "testharness" + ], "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html": [ "bed8df8fa8df0c9c0595368fd01b9ee329ced87c", "testharness" @@ -708361,6 +737682,246 @@ "867558acb76ca1a70294d29106020cdd20a3fada", "testharness" ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html": [ + "61dae792be247bc30628cbbd31f8505d72ac724f", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html": [ + "28943bd65ad5a66293c8473b448d9958ca70c159", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html": [ + "97838e55dd9bb36eae5988e902b5dc17843d916f", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html": [ + "7ab0b1c802ecdd9484b8730d3cf068533a270523", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html": [ + "fea32fc2cf8c0d2a2d1f101bde0486b270e766e2", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html": [ + "46eb52685f2a7305ace16c3d2ede8599fbbf6f08", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [ + "cd058bca0f8f4021d40bb46aee0ea5bf37c290f5", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [ + "1e70df0fe195e59e9383baf6d2562a0052baf5c2", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html": [ + "5eb124f8107b0f936aa1d6fafc2da9f28c61f617", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html": [ + "d9115a5b7e7adc27f390463a62de601ebf73272c", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html": [ + "87f087b0332e438b3c8c0215e23a6fe2bfac152e", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html": [ + "7db907cc0a700c2d7c1c92a0dda6f041087241e2", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + "72897fb3250464235060d81a14cfbab72179cb36", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + "75b69b0a6c9b21cc25ad19fee9084af004a1256c", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html": [ + "b313eed7ca73d1b2b9eb44347ffd663f26f30079", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html": [ + "6422bd2800d7276322079b3899792940b2105797", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ + "6b3672701f09ab6bf91f22ea550bb2fe3797601b", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [ + "a4d1a9e4bc20f58432503311e6949558ab87e04a", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [ + "3b8b6d052e5cff13cc6afb92cdc411f1c1303817", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [ + "dcb2de489af46536c269f287fdc197fc80bebdc7", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html": [ + "dee666010b1b25751faf3ea4bc14a8d25fba8d5f", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html": [ + "87183fed8b61b695109ef390ee5eaba7b0ed9a17", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html": [ + "899b8869fe5ae65f090439be70b4f985d8ea1593", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html": [ + "d9bb92b4d10d2d561ba524a7a448eebf21fc2428", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html": [ + "a984c6af4578975680bccb2f7c57d920e2121c5a", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html": [ + "a9ab54b1acd32228df510053ea14085d3544be5d", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [ + "106369921915c799412e0649b6a818f4a302aa97", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [ + "490464c2f84c151e8397cd36db0cd68b3a218c69", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html": [ + "f57d072e035dd5c0bea7cdcab1787380bc9f0f7e", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html": [ + "3a0e3b5cd92eb6987dae2795c1cdd22f7c3c3abb", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html": [ + "80f5f769d8344754e9389020156828c9bbcf7b4b", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html": [ + "124b069c7bb4a808414f7b7449948f58b4d756da", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/a-tag/cross-http.no-redirect.http.html": [ + "ef044190f3d896acbf89e997e4e1be81567ea44e", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/a-tag/cross-https.no-redirect.http.html": [ + "29d0a80b3ce939dbf1de1ab0eb09d3967fa76e7d", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/a-tag/same-http.no-redirect.http.html": [ + "8f6d8e3da84ba378194e1798f14fd718a23eb405", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/a-tag/same-https.no-redirect.http.html": [ + "977224a32d8f82e526d31ec4cc653ff8eabeef42", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/cross-http.keep-origin.http.html": [ + "e775754b2965a5ac6eb613d6d61fdd900b977185", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/cross-http.no-redirect.http.html": [ + "d5b1c8676c0a31bca06a13f07c04c3e9d7a4c876", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/cross-http.swap-origin.http.html": [ + "4f6d03dc292344f02b687a69cd36632cd25a5502", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/cross-https.keep-origin.http.html": [ + "ccfdb82d41b9eec2e32514bf45f6fbf35a6f08a6", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/cross-https.no-redirect.http.html": [ + "2486bcd382c3dacd127e250ddb4272ed9871fbfd", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/cross-https.swap-origin.http.html": [ + "98d4dd60f366de987b8403ee2391757e41662c22", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/same-http.keep-origin.http.html": [ + "0bd6f4b64c5c723b6bf427c84fc81270234bbf9f", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/same-http.no-redirect.http.html": [ + "4c85a7010ed72183f3c00db0f65990c192a56556", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/same-http.swap-origin.http.html": [ + "713c83f5367592395b66d8c5d035f42047c16fc4", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/same-https.keep-origin.http.html": [ + "b65dd3ea98bc4f5fcb528a35c2c292dd2f2b63b3", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/same-https.no-redirect.http.html": [ + "cba70c66462a60962097bde788129a14377585cf", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/same-https.swap-origin.http.html": [ + "e52b096384013148dd5519ca7e5b9390cae713e9", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/cross-http.keep-origin.http.html": [ + "6f5959b7982972dca217b63de155898b257e0085", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/cross-http.no-redirect.http.html": [ + "b2e7484c49db4fbfe9612ff7ebd801b2e19645d7", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/cross-http.swap-origin.http.html": [ + "bc490b6ece32a3e44d1a462b13bfcfa84829cd86", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/cross-https.keep-origin.http.html": [ + "8a54a7931b23a95bfe3965d9ac8e4b95daba4030", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/cross-https.no-redirect.http.html": [ + "f005a3460516615025b370b1222b51b65af5c3ce", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/cross-https.swap-origin.http.html": [ + "b8a785f1800d0a0a2ad95ce2b400a2683b820629", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/same-http.keep-origin.http.html": [ + "61b291ba530c774d133e6386f461c203482762b7", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/same-http.no-redirect.http.html": [ + "1c178722eb8f5279bd2998beeb6d520c92a6aaf3", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/same-http.swap-origin.http.html": [ + "f19a5c5d06afce1b1512fee0fe941ea4254ae45c", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/same-https.keep-origin.http.html": [ + "c4edc1bf8b452dffcd35910303b3962a1a189e57", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/same-https.no-redirect.http.html": [ + "51269dcb131234f185bb8fce3e6c71f6dc952ded", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/same-https.swap-origin.http.html": [ + "7507462e915131c2af91a0df6a4acba5217ecb7b", + "testharness" + ], "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/img-tag/cross-http.keep-origin.http.html": [ "ab1bb44662b51d8eefa22e6d43d5fb15f8f8ae12", "testharness" @@ -708409,6 +737970,246 @@ "b6b4cbc6d8b6341acbec81f1289414bfc0ea64e8", "testharness" ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/cross-http.keep-origin.http.html": [ + "7335b31d83baa4ce0c5572eba0e6cc1168011611", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/cross-http.no-redirect.http.html": [ + "defbc30a0a08954033595af1f18f5008d7c428a9", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/cross-http.swap-origin.http.html": [ + "96cb00ae16763cf14f754c99fefacef796418c26", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/cross-https.keep-origin.http.html": [ + "bb738de11c2f036bd21c2957a51249e9dd09b066", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/cross-https.no-redirect.http.html": [ + "7e62b7c298f5b6055af599ed4aea89a49d86441a", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/cross-https.swap-origin.http.html": [ + "443159429e989cde043ce0428734232db09fb970", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/same-http.keep-origin.http.html": [ + "45f9a76aebc97ac7367898e9fb6b8e4ea37ba176", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/same-http.no-redirect.http.html": [ + "763e2c6ef901dfba273b399e298606472e02e44c", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/same-http.swap-origin.http.html": [ + "48ef1e382581e35c612b993cb7cc3db91ba7fd21", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/same-https.keep-origin.http.html": [ + "436cf4894568c41fb8a5ca945a220370cef7ddc8", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/same-https.no-redirect.http.html": [ + "6f253939d019592eac4e716fec311836d5468504", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/same-https.swap-origin.http.html": [ + "78c61c57885a401dc21480bcf32fdfe1cf4fa163", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + "579b3d68587f39c1189e6b98f95bbc03ab299183", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + "b82e2548939c527e0ad246c60dc10dce9f2e807f", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/sharedworker-module/same-http.keep-origin.http.html": [ + "aa51ab5fa74090a672fcd8dd74b73f63ce94e90c", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/sharedworker-module/same-http.no-redirect.http.html": [ + "93cb9c64d4512051df4cd47dc7efb8422ef93606", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/worker-classic/same-http.keep-origin.http.html": [ + "52ccb86b8c43efa23790229d48a16ea05d04455f", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/worker-classic/same-http.no-redirect.http.html": [ + "92bfc37cff4f2ba38577b072c4d20c900e080d56", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/worker-module/same-http.keep-origin.http.html": [ + "56810a2673b1225abf282f6592f438dd8d0594ad", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/worker-module/same-http.no-redirect.http.html": [ + "cb2d04f1eb8a237ec9a5c11e9d75da8b265194ae", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/cross-http.keep-origin.http.html": [ + "f0db1d2f6bad26899c0b934452366773f246ef39", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/cross-http.no-redirect.http.html": [ + "413a7e33260ca72995efcf9b2e4be259f09890d5", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/cross-http.swap-origin.http.html": [ + "8276fa0328fd770b61389a82e84ed6001686f1fb", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/cross-https.keep-origin.http.html": [ + "1df2ded6dc38d25168c052d9837cca5b8affece5", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/cross-https.no-redirect.http.html": [ + "b2a8ed0e41888f2e0122c1ce1e9c8cef7847769f", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/cross-https.swap-origin.http.html": [ + "d7b77d38e3096b4abd16b7abd86d789c720c87f1", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/same-http.keep-origin.http.html": [ + "61377d5a6296364f707fcfc57a827fb0c2e83b6c", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/same-http.no-redirect.http.html": [ + "87287ff6344bcb02715369795b2dacba680342f2", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/same-http.swap-origin.http.html": [ + "3ef61ba51b058becdfb65a565accebbc4e01767b", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/same-https.keep-origin.http.html": [ + "6b843a8508c9be13cd5be7d580f49456300915b3", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/same-https.no-redirect.http.html": [ + "7cc0b3f242011c01aa391438072f9b078f399518", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/same-https.swap-origin.http.html": [ + "1e5d08942ac41ce71bb7cea4011eaaae7506e426", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/a-tag/cross-http.no-redirect.http.html": [ + "7a187a397944a4f56ca9bacb0a54b49dd8fb7e7e", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/a-tag/cross-https.no-redirect.http.html": [ + "cfa4514f7e916bff1c6f6c278732d7a965dde103", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/a-tag/same-http.no-redirect.http.html": [ + "e4c31baeec5b7054736bcd00a109eb754dab98f0", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/a-tag/same-https.no-redirect.http.html": [ + "883250591931ac4112ffbd00083a965c86214258", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/cross-http.keep-origin.http.html": [ + "587f19558b8c127b03ad7eb3cbad93ea086ef0b2", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/cross-http.no-redirect.http.html": [ + "b9b5b7097976af7593233f8d37020cf86f55e247", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/cross-http.swap-origin.http.html": [ + "9b63358930e6349a589ccfcce55c16bf0573ac6f", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/cross-https.keep-origin.http.html": [ + "35405fd875a8d30c7b6b5077c97ba8cb47324285", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/cross-https.no-redirect.http.html": [ + "5356526fa2fdd2dd93aa8bfd02a0b2e69f914748", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/cross-https.swap-origin.http.html": [ + "4850e60c19dd700fb070708b43b9e315f625605c", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/same-http.keep-origin.http.html": [ + "560f249a7066a013663dc116c78e9bcca8f03245", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/same-http.no-redirect.http.html": [ + "30eb4107f91b4cd3734da8d7656f7080498633a6", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/same-http.swap-origin.http.html": [ + "bf14218349e209ef61a5f32e475a2c6115e2d9c6", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/same-https.keep-origin.http.html": [ + "205782cf09b4c0f318c8733c4f1f3f4009650cad", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/same-https.no-redirect.http.html": [ + "c3dd149bbcbaa9ae24d353d45dca6dfae805539f", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/same-https.swap-origin.http.html": [ + "a98bc509663eb9d735c24b1f38ca815aee81b0f6", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html": [ + "2f7639f1328841496168242bee2d2869303446ab", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html": [ + "e3a641ef193636b5cc7353ba7ec6221e6afe53ee", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html": [ + "008bb200014a014d7326fb8002dea727bd190a90", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html": [ + "da17913629a376821b6259c3cde818c118ae5a2e", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html": [ + "d464d911afb5a12b7579b5a233a482c9cdd2dd50", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html": [ + "675ade0a1e108fb5e18caae45d3c54d03ef38107", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html": [ + "94b6b4805eba2795ee6a22d9b539f38c01f80ac0", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html": [ + "172eb9380b3b4d84f24acdbe290e5e098fa04957", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html": [ + "ce4f0606beeeac6a79ab21e6c4c653ca928dae4c", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html": [ + "97f1046968008de0091182cc805d2ab6335f91e8", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html": [ + "f747c06b072012b036f7a959b500796fb9e20614", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html": [ + "948eee0fdfa2caf000b6e2878e24ce8dc183a481", + "testharness" + ], "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/img-tag/cross-http.keep-origin.http.html": [ "3ad3d020d7f67570775a4726443b57b6a5a2c322", "testharness" @@ -708457,6 +738258,246 @@ "a412e4c220c4bcbc086f149660926cc442b6fda5", "testharness" ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html": [ + "36c2096560cda1116e4dce87aa3c89dacbe2314c", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html": [ + "9bb1df01daf042aa69d6f0d648b10d645fb8fc33", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html": [ + "ab95c56e51ed0adcfd6a40d32f38b7970964b9a5", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html": [ + "2344d58bc6b03a9d68ae8fe6ee31f6e1c34dc1f3", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html": [ + "0004ce2ffa947be734ce8a6b2bd649465aae8778", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html": [ + "e326a9d768c7b4dcfbdb8f9d0e9f68fc3e5145b8", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/same-http.keep-origin.http.html": [ + "5f6262615d6a464200cac6926d3fe4d4e47aef30", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/same-http.no-redirect.http.html": [ + "7570cc4947872712a4dfca805d1e44174bbb0f54", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/same-http.swap-origin.http.html": [ + "af0641f8c745723c9edc4bdc87ec11d98b8b554f", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/same-https.keep-origin.http.html": [ + "54feb6632902604337bac0e9462899e2b300d119", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/same-https.no-redirect.http.html": [ + "250e980c7fa33032d66626669663c326580dbb6c", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/same-https.swap-origin.http.html": [ + "6069926a9193e14f53ce1481c0ae58dad0d56794", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html": [ + "0a5f0f979f4b341b273e95d23bcde07619bf47e6", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html": [ + "32ca37a3de60cd93d9e946514bed0baad99b77b5", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/sharedworker-module/same-http.keep-origin.http.html": [ + "c7216e1f587b88cce8d2f384e372fb84940897b8", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/sharedworker-module/same-http.no-redirect.http.html": [ + "0272dbffc752856011d6f3aa625a217fe4f8ca8c", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html": [ + "285101d599268cb19270b1129ff34198e4891041", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html": [ + "29846f09a8a4b482bf713f27bffc28b2f7ad6442", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/worker-module/same-http.keep-origin.http.html": [ + "497776763c8bba27a2efb11387ecdf79bc931b63", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/worker-module/same-http.no-redirect.http.html": [ + "3193602fb6d4e0cbf7e30143f5c9f906150db341", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/cross-http.keep-origin.http.html": [ + "33bbe1e78513ebaede0c5ef0d692efd93468b777", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/cross-http.no-redirect.http.html": [ + "a92000f153e171a82ca3864c8f2ff606b5027377", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/cross-http.swap-origin.http.html": [ + "f182b8404658e8ceb333a818e276ef5f6550e9e3", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/cross-https.keep-origin.http.html": [ + "ec560e81e806d5f74310e75d84bf3c56eb79eb03", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/cross-https.no-redirect.http.html": [ + "d8e3f74f9551a88f8b66794031822c330408778a", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/cross-https.swap-origin.http.html": [ + "6bd6426cf0d34fde796dcfaa02fdf6bab91d649c", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/same-http.keep-origin.http.html": [ + "f56443098a3cf3b537b5e13148382a357044ddbe", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/same-http.no-redirect.http.html": [ + "9c89f3e67be306314cfffbb67440e34ef03e334e", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/same-http.swap-origin.http.html": [ + "8d8169218f13303b7aa4343711bf334facc8660c", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/same-https.keep-origin.http.html": [ + "af402a4ecc8266759337e8c60f48fa5a63541f96", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/same-https.no-redirect.http.html": [ + "c7b94745b63500137dbe5a9129f57f0ecb321fd0", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/same-https.swap-origin.http.html": [ + "fa9a0b43c78129c7b14138935355852dd05df69e", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/a-tag/cross-http.no-redirect.http.html": [ + "75152e33bd0d8d55120f50857c3aadd039da38fc", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/a-tag/cross-https.no-redirect.http.html": [ + "cce9287c83c6ff0db2bca44732eba3087ba3a624", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/a-tag/same-http.no-redirect.http.html": [ + "04cb817b65da7b19223f3595ca78b4ba97277306", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/a-tag/same-https.no-redirect.http.html": [ + "9f74c763b160cb05bca3950955cd33cb0b5d9252", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/cross-http.keep-origin.http.html": [ + "5ca0f069048b022f685be267d93f93babe3ac691", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/cross-http.no-redirect.http.html": [ + "23486bd4715ee2865170b7dccbdca070a41b0128", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/cross-http.swap-origin.http.html": [ + "828022035a1af0bfd989c9e7dd22e8fbe4516303", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/cross-https.keep-origin.http.html": [ + "2ec65fccfade3fd8a76ecfeefeb2d8909aaffbd7", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/cross-https.no-redirect.http.html": [ + "59574ff0674cad81e49cd376498af54739c12353", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/cross-https.swap-origin.http.html": [ + "7e52ffd6599b037f24eeb4739f4c85bf9844e197", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/same-http.keep-origin.http.html": [ + "90495c0aaa411cb5efb3aceff1090a278b8b9308", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/same-http.no-redirect.http.html": [ + "d73d9fbec33753d0ed77833c921260dbf8f1d714", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/same-http.swap-origin.http.html": [ + "3287e6485e18704fde5443b9889557b976a795e7", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/same-https.keep-origin.http.html": [ + "cc1d014c94970d1a408284ffaee68e459d7c6764", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/same-https.no-redirect.http.html": [ + "0ac7079dc5d632ef71e8575305d05c6dc1696943", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/same-https.swap-origin.http.html": [ + "9f6100714ec33802f706df2af99de3059ef0bbc0", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/cross-http.keep-origin.http.html": [ + "9ad7a08c3317890e24415e1e9112eedfb48277d2", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/cross-http.no-redirect.http.html": [ + "bbf7c023df58fa471ec5556eeea223cbe0338281", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/cross-http.swap-origin.http.html": [ + "19f1b7d7b26957045d866e43a9c5dd77bb011659", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/cross-https.keep-origin.http.html": [ + "006bee035ad602da495578c04f37c2580379d77f", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/cross-https.no-redirect.http.html": [ + "3d7b03876d4139b32b79e4977c2060c1ee674565", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/cross-https.swap-origin.http.html": [ + "3c0fddbeb6b48ab9e6c0538ba391982271c2d82b", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/same-http.keep-origin.http.html": [ + "f7da334648e0330cbc780f17d2c9ccd547180e2b", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/same-http.no-redirect.http.html": [ + "4a8645ea9b925b1b381c4324c7e34812fcefd44d", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/same-http.swap-origin.http.html": [ + "4bcb5a48d83ec2af59b3d8a283920cef1f12f025", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/same-https.keep-origin.http.html": [ + "59716636463009426dee3dfeb4b2039b25626ba4", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/same-https.no-redirect.http.html": [ + "7ad0bb08359fb23572ebc3e0cd748f186e1798db", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/same-https.swap-origin.http.html": [ + "ebe0978dfd27f326323c66aaf1c2deec05819e20", + "testharness" + ], "referrer-policy/gen/srcdoc-inherit.meta/unset/img-tag/cross-http.keep-origin.http.html": [ "f35f4f9d62898a9d45114090703ca2ca468102ac", "testharness" @@ -708505,6 +738546,246 @@ "761bffa81c557369ccc88c2efd8f9e2280064d2a", "testharness" ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/cross-http.keep-origin.http.html": [ + "48a68a2d4b3058021116870798ee429ca81fa4e8", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/cross-http.no-redirect.http.html": [ + "a890c6e957ac5f4328dc56b48d5fddd1af3b1553", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/cross-http.swap-origin.http.html": [ + "16b4615a617ce28089390e7c92a0f0343e37ffeb", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/cross-https.keep-origin.http.html": [ + "fed78b9665110da04827d3841d803ce4e0011efa", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/cross-https.no-redirect.http.html": [ + "663bb84817946e75f708fba279d8063823c135fe", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/cross-https.swap-origin.http.html": [ + "fa5d0191afa819deddb63ac40810d86c9e06f248", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/same-http.keep-origin.http.html": [ + "0b18ad9dbe85ab94a925850b98b19ba1fdea242d", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/same-http.no-redirect.http.html": [ + "be4e33824273ff6c9360034a94a3f6e75f606b87", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/same-http.swap-origin.http.html": [ + "a6dd2d87549d0884290d55cf580b77d8422070da", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/same-https.keep-origin.http.html": [ + "a14956b1556269caa2ee93aca089272db93b40bf", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/same-https.no-redirect.http.html": [ + "d273cef1be798095237038c501a86ab1e06a082b", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/same-https.swap-origin.http.html": [ + "dc18808d7b32f1a2da745f7cddf2ff1bc0480808", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/sharedworker-classic/same-http.keep-origin.http.html": [ + "886ddaaf001ba36417f6033f4e4908abd458ea92", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/sharedworker-classic/same-http.no-redirect.http.html": [ + "b85408449590c3d966bcf849df9eb503404ac690", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/sharedworker-module/same-http.keep-origin.http.html": [ + "3c7974c0570bcb89b801290fe7238fef3ba687eb", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/sharedworker-module/same-http.no-redirect.http.html": [ + "ed0397be62103acaa450b55f3d04bc36d7bfcb98", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/worker-classic/same-http.keep-origin.http.html": [ + "b5b54ff3db133d7388b4fd8b44391f1d48615ee8", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/worker-classic/same-http.no-redirect.http.html": [ + "57c8036d10ef8395f1d1ac4e013f71666bb6d3eb", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/worker-module/same-http.keep-origin.http.html": [ + "de8ff3735f59ddf41ed195a94c82c10919c68d69", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/worker-module/same-http.no-redirect.http.html": [ + "16ca268c59faaecbd0d1ccd4482fa79576f2b818", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/cross-http.keep-origin.http.html": [ + "838b4df0c18717184868573cb40428e9d3973e16", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/cross-http.no-redirect.http.html": [ + "731181dc00553786640eac74e62074f1f4352c82", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/cross-http.swap-origin.http.html": [ + "370c65707ef776165926e7388242091dc7249d0e", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/cross-https.keep-origin.http.html": [ + "a8f8c47ae6551bb1ff5c87b49839ac56ca9b7e9a", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/cross-https.no-redirect.http.html": [ + "17f88a23e07d49bcb5b4d7b588a07489d4aa12e8", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/cross-https.swap-origin.http.html": [ + "d6da2ac72b228272b3de8e3c6899d6e0e5273d19", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/same-http.keep-origin.http.html": [ + "6871d18525031703f3569231a1c983c78fc6821a", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/same-http.no-redirect.http.html": [ + "98dcf64e4b959f2314ca43aba86cb2126645e78f", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/same-http.swap-origin.http.html": [ + "881bbe39e44ce07d31adfc6eaa34b8a1965bc967", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/same-https.keep-origin.http.html": [ + "0a9d535a24922c8ca9c28a9836e247c1b6511822", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/same-https.no-redirect.http.html": [ + "cafcb65bdd3ac8c753e2e20e4b7d94f8399b58be", + "testharness" + ], + "referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/same-https.swap-origin.http.html": [ + "b3542367e8a4b04b38a5350140d404555fdd780a", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html": [ + "5426ecfd128b5722b124374762f1df8442054312", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html": [ + "d324f904f54f792138e725104fd52d7fec3420b7", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html": [ + "d4fed058d04f8e99d9b8239e322e0af0f7528897", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html": [ + "196f009c3e9ca06b1a1d9d32361ba994bbbded3f", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html": [ + "08f9b54cfd7cabda041bf6061073658d90b0a8e8", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html": [ + "dc009810794bda96296d492e486e361616171b9f", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html": [ + "df80425f9b4709093370147ae618a4aba74d2671", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html": [ + "807c4a10d3d0dc0bdf1fac3be3c5b36c9dc0465d", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html": [ + "bf62b32874a0adb2ae3c72f6bf6829b45085779e", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html": [ + "4a8b52fad07cda11742db408740eefeb18d1f4fb", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html": [ + "6dac23a18ca88f31162c9e4490f5f4d28316c3f6", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html": [ + "daaf0539627362142c09f7cf3e561c1ecd68a863", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html": [ + "455ebd1643f0ecc20830a88bf8e8b08c2475440d", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html": [ + "d9934e4c71f6df17d7eaa53ccc79cf1c4de2368f", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html": [ + "37b73c297db3527dcbf6faf8ffaf6b1c99f7d41b", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html": [ + "7da0da86422670290cd5b75828bc2aa16333de50", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html": [ + "ffcf21aca9ad1f2c10f55f254ec1acb98890ab14", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html": [ + "46383f9c5d151ddc4bae2200e2c5fbf261edb76d", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html": [ + "945fd75e305e5ec0a46b6afcc72827a32de5c62e", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html": [ + "391da44629f2858c5688df51fbe49914f9a9899e", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html": [ + "4c52ba6972ca2ba26c8366197bdd3da14ab215a8", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html": [ + "41a67c83ad6aba09c876a64c71f834f5588057fb", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html": [ + "2102129b4f0de7f6c8cff521982bfbb7ebcb917d", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html": [ + "40ed3cc628781bf4d814d14cd66ec32b6c181624", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html": [ + "320e090d22f3fac3cb2058a960b1d3859e2a053c", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html": [ + "d80816c4407b245303b0437778dad548f8d1ded7", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html": [ + "31a5118e832c1f99046ffb9cc27bb6f67be4d01d", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html": [ + "346129a7bcbeb1ce765d4d2328769c0a5b671730", + "testharness" + ], "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html": [ "2d7e93c906b2cbd898e48a527ee2e23a1e2335c1", "testharness" @@ -708553,6 +738834,246 @@ "d8d0e2642db7247bc7bd61a8e37e6b5c53a8ae60", "testharness" ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html": [ + "dd16a036f090e8077d50f53175b38e918e0524bd", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html": [ + "fc6173804e706c44600da858451877366434338e", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html": [ + "03d4b70713b7f65cef50a1247449fc73ab8bd819", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html": [ + "284c0944cb65a39b656d4075cf968c6c370ce974", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html": [ + "a98720698728a79bbe34951c96ac5389b85b3a76", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html": [ + "a55b5e121d8d872a6235c5f7d7626037436e004d", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html": [ + "3f1baedea5c5a4c7cbaa183646f18a153de05b2a", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html": [ + "21c414e1047de8571550efc8d216d12cb1a84f49", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html": [ + "81eed234b5bdc0ab869463f326c9783f0c55b21e", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html": [ + "7968028f643537eaf2654fa4f7e7055805536f91", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html": [ + "71ce4fd3cde8adfba38829c15e384db900b00beb", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html": [ + "4c69c2379ca67cc0876be3065e4644cb0ed8e861", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html": [ + "d5101b8d775837ffaf2a9937094647dcc34283c1", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html": [ + "9e5349f360aa48bd6ace1e3d9abfe6056eb090b3", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html": [ + "867e7af2db1b330868369f93ddb998fa01b46e21", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html": [ + "6c1d09fb0b8f9e576e140d19ab3c77bda8ce2e96", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html": [ + "6f2028e5bbaad3e1f8b863ee4cf270cd41f8f280", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html": [ + "e37ebe8014873c5dc405cbf0f5c6295d71eda576", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html": [ + "b5b5c173c4c3342ff2e4c8cb99a4ee7187a81e1a", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html": [ + "56623fd8b0b0e4b3fad068211b6750bf9fc4c4f8", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html": [ + "1ab57a757310c2174ed6892395639267979d2c4c", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html": [ + "ad0f8befb6db6fdd1d04a652145a5aa8204ed133", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html": [ + "55ab73cccd7f0ac553369d7075f855f4504dba91", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html": [ + "e0b2cd8326787c855c159003a78b3f082c9a1324", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html": [ + "9c50ea8fec53f60774b3aba86a9e55409446e520", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html": [ + "feb7d2342d87a375a7c134d2250835b280e1a213", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html": [ + "c21868a1b7307bdebd618c13c5c1cc49caec062d", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html": [ + "cc48d7617ece8586d8f9698cf936bc7c5326cffd", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html": [ + "73a2fa2dc2e3ad7bf707365de2f20166343d8b0a", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html": [ + "3bc24c2959982d7746179d558c85b12835688871", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html": [ + "00b0c7d4d4bd2de96f34271fb25513d804eadd24", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html": [ + "4385366c128864913c3aeeda0c6e6e08bd28a526", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/a-tag/cross-http.no-redirect.http.html": [ + "214b9fb3ddb9396eab90f89bead34c4fa7b1921a", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/a-tag/cross-https.no-redirect.http.html": [ + "8cab1eab14854cc01b834a504c4b1f89701dc9dd", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/a-tag/same-http.no-redirect.http.html": [ + "cc2134ea07673c9be4c1614b4a2b2442832a51e0", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/a-tag/same-https.no-redirect.http.html": [ + "efb6d9f77d59a65b8e4739d42b830065224d0094", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/fetch/cross-http.keep-origin.http.html": [ + "3a1d699657d40a0d645f08f8976f5468ba0fce52", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/fetch/cross-http.no-redirect.http.html": [ + "e84a4e36e74fb90f7776e3042855654fb79365d8", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/fetch/cross-http.swap-origin.http.html": [ + "8581a76deb39bb54eb8508f1c95516687e154181", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/fetch/cross-https.keep-origin.http.html": [ + "3df67976f54dffa03d315c5ebd184c7f9e67b663", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/fetch/cross-https.no-redirect.http.html": [ + "b0f39b23536204c889cf4a77c2d5ddd7502f2753", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/fetch/cross-https.swap-origin.http.html": [ + "bc7ebbd5ae0b3be1222da31f90998695d686be3c", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/fetch/same-http.keep-origin.http.html": [ + "597bcd1c74ec593ded9b0a585b45998b89ff3f2c", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/fetch/same-http.no-redirect.http.html": [ + "3706c2fee7134b60ccda5ad12993a2c07c534c4a", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/fetch/same-http.swap-origin.http.html": [ + "3d711fe8752a72d030ffd653c79fc90a48c16e4b", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/fetch/same-https.keep-origin.http.html": [ + "1f6d5e78d99280143a2a63ef4a31188e935d26eb", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/fetch/same-https.no-redirect.http.html": [ + "9bfa9f6b070a28f72b2f21a65e3c830bbd303558", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/fetch/same-https.swap-origin.http.html": [ + "06fab128e718fbf7a25a04e9b4af0d72bd711191", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/cross-http.keep-origin.http.html": [ + "3560ff9b4d78be529c79c3d373e94608b742c5bf", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/cross-http.no-redirect.http.html": [ + "45b0449e9f528f473cd730125f7f915a639099c1", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/cross-http.swap-origin.http.html": [ + "c8b43cd9b3672e077d9426e63a2616e38e5d05c3", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/cross-https.keep-origin.http.html": [ + "4254b233b234ce80af6733d4112fad2a538c0275", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/cross-https.no-redirect.http.html": [ + "56cebd5d5583a48d4ab85efeb55f86353580c2a3", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/cross-https.swap-origin.http.html": [ + "ec453eb840e2b1c080825b8f34dc5748fbb41be8", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/same-http.keep-origin.http.html": [ + "5e599f3e03bd8ec608219174a1487c8db231730e", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/same-http.no-redirect.http.html": [ + "33d047320f67d48eb92eb92cb0cd259dc6ddb1b5", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/same-http.swap-origin.http.html": [ + "ecbb7e0047eafab798642977d2f041553ca40c27", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/same-https.keep-origin.http.html": [ + "334c63003f9ae5c8adab469ac1ad35191076f921", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/same-https.no-redirect.http.html": [ + "a102909bfda543a9079ba7823f930e259fd600cc", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/same-https.swap-origin.http.html": [ + "3cbec9f31eae005dbeeca9d6dc04c40692e6201e", + "testharness" + ], "referrer-policy/gen/srcdoc.meta/no-referrer/img-tag/cross-http.keep-origin.http.html": [ "0e867173f6acfc435cddb6d9636f299b2b6d95c9", "testharness" @@ -708601,6 +739122,246 @@ "bc62feeae0fa264a0ef2729e3dfafadbec83fbe5", "testharness" ], + "referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/cross-http.keep-origin.http.html": [ + "920464fd700e6a78ae16246b121da8bfb0b823dd", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/cross-http.no-redirect.http.html": [ + "6bb6f5a0af5f3a2564f2c01822a2d69bfad550eb", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/cross-http.swap-origin.http.html": [ + "4ea1bbead7438c92b58e084c3597c4a32bb1dd66", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/cross-https.keep-origin.http.html": [ + "7386cc1fd19f6bb8564b46df6e4998f597d43087", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/cross-https.no-redirect.http.html": [ + "16d46ecabea43d00091f20bee145c7206066c4ef", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/cross-https.swap-origin.http.html": [ + "0ecffdd361ef821a7367254862a6d2481c64fe99", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/same-http.keep-origin.http.html": [ + "b0c20849b05f8bb9344cdc08d3dd7f8b34a92b29", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/same-http.no-redirect.http.html": [ + "db8129b83c87352f3ff59bf5b4dab8659c1b5ebc", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/same-http.swap-origin.http.html": [ + "0d3b14520e4feb4aafbd6aae4a67fced934feabc", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/same-https.keep-origin.http.html": [ + "a53762aa01666764e09d166ed7c7ac88ea9a32a2", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/same-https.no-redirect.http.html": [ + "0e6b5a2929bb6aecb8592aedb63cf13502c8ca3e", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/same-https.swap-origin.http.html": [ + "0307c95e48ba84c43b4b231f05ece71651df9f69", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/sharedworker-classic/same-http.keep-origin.http.html": [ + "02d61af329c0686d6d93babedc329709e3c5a4e3", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/sharedworker-classic/same-http.no-redirect.http.html": [ + "0fa721bf0e282032b751948160f670b9f216cfff", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/sharedworker-module/same-http.keep-origin.http.html": [ + "c359962e91eeb765f3d01e72523c30dbd0f42452", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/sharedworker-module/same-http.no-redirect.http.html": [ + "adb652228f3cf81c3d5944eb3f7972b9e1537a83", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/worker-classic/same-http.keep-origin.http.html": [ + "9a36162f2fe472a02b4c5f24017f7b1c8dd88fc2", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/worker-classic/same-http.no-redirect.http.html": [ + "83e7a87c2691f11e4b5d93d4364d1190b43946d5", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/worker-module/same-http.keep-origin.http.html": [ + "6b2f35f567783d2dfcefba55041e98061c05944b", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/worker-module/same-http.no-redirect.http.html": [ + "20633ad7aa6da7df5e65ca33ab5b0da40c23c969", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/xhr/cross-http.keep-origin.http.html": [ + "3cd819762a5df3e44e8dfb25bcf9c8a72695d298", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/xhr/cross-http.no-redirect.http.html": [ + "48a848456dc09fd9079f8066bc00c6daf1ac30f7", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/xhr/cross-http.swap-origin.http.html": [ + "0d76892ded5784f4b55b64f40e1d57f024ddae95", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/xhr/cross-https.keep-origin.http.html": [ + "aa1ac2839ffc3e2be3ae4e1490fb1ef4243a9988", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/xhr/cross-https.no-redirect.http.html": [ + "1a1ee84b8f82800e2171df98cf9f8dfa3cd1379d", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/xhr/cross-https.swap-origin.http.html": [ + "a376edb23a95584acadfd71577d921c6ac54b675", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/xhr/same-http.keep-origin.http.html": [ + "dd091e2d6b141b1c61356d6a44dd1b7473ec1bf0", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/xhr/same-http.no-redirect.http.html": [ + "d8282a73f8d8d997074be657f8b95c9a677582ef", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/xhr/same-http.swap-origin.http.html": [ + "f6cf5c6b439f6c65b1fc4b7f3a3c8570804ed593", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/xhr/same-https.keep-origin.http.html": [ + "156a744cb7ccfcef2f20833a18d1cf8680b75469", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/xhr/same-https.no-redirect.http.html": [ + "ac0a9ec10d678334ee354cf0c52a79bb0fd1b260", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/no-referrer/xhr/same-https.swap-origin.http.html": [ + "5ec2fede54cbbcaf84d7fbc84e7f576a16da5372", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html": [ + "1299dce3fcda0de7c0b9917a9a0243dd16a3f8bd", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html": [ + "0c8182d3e9b41c4d3f4274b138aa2e7db2a06d9e", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html": [ + "45643283c9454dd9d04f415fa5e394adff11af77", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/a-tag/same-https.no-redirect.http.html": [ + "6ec77a44d6334aa2f107fb580aa3149912f2d1cb", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html": [ + "2c4ae1c7fa320d9a04f91f8c57e521e981e80b8d", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html": [ + "7ae2d65964ebd414a1f219d150664567216c2c02", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html": [ + "442b14c4abdd49ee00303abb0f9f3f8033f9be40", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html": [ + "a2ab30e4fb56985729869efb118dc85e7c711a3f", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html": [ + "914365cf6b3626f2bf1cac922e81ae50e4bf12b6", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html": [ + "3ce4038bf29ca509b087097c57203c5ab116527a", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [ + "ff0dee3f84a6792e9e3108f2db98ded96b076708", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [ + "c9fe7fae7648bf3da618dedde9da04d7e4fdfcf2", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/same-http.swap-origin.http.html": [ + "8427c5db2c7e20b744c83882676d1508e8eda083", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/same-https.keep-origin.http.html": [ + "da57e3677542282649c034d1aefccf2acc8f27af", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/same-https.no-redirect.http.html": [ + "195bc38cddf6006e19cd8d496ba11b94468b551a", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/same-https.swap-origin.http.html": [ + "78c5892bef009423dc8c889f60cc2a54c0bfa6f1", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html": [ + "5a3e8177fb3c0e7e898aee6e3551a28d01cf2bbe", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html": [ + "47a2ca3a35092c97d4d18e16d98bf13f7dc4bce5", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html": [ + "6e1d0632091a0940f2e58ef4c0c6dda589cf618e", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html": [ + "05477625ca8ac23d4c736530495bc3f479a9e5e5", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html": [ + "4705dacf4118a8f3cd284b81a80910641f2287b8", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html": [ + "0d8b84afc7c0ada3dfb914cdcc90a5a4bc60ca0b", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [ + "867c54299539abb036d69c634bba270e004a1f94", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [ + "82ac3cac8f2b9d219b375a2a5403e90b4cd2e79c", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html": [ + "7d004b4abcb1f95e77e6e4c093c194018768e3d1", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html": [ + "c58241c288c42c6031989cfc9a1db1f326dd0e4c", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html": [ + "11ccf9229926a8e34e6c7f7fff55273494f02533", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html": [ + "0e3a085267d13543d1f3bbb5082725e883c28221", + "testharness" + ], "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html": [ "5d061f4fd38ee1aafa3c2fe9dda8e626c0ef365c", "testharness" @@ -708649,6 +739410,246 @@ "0114621aa7cb6467ed2ea17261deac2eb86dd0a2", "testharness" ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html": [ + "8c0c328fe9a6e40e52245863c682cd2b9cef30e2", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html": [ + "aaa0ff21c66f627d5056fec0c08929a223c5bc07", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html": [ + "2575fe7433b682e583f5fbc28bd594df0d2442bf", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html": [ + "7dc159c3995cd1cac1976f469ba9daef8f8e3e35", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html": [ + "7f69cd9c3deef75711d79dbb5aaef65e3497e0bf", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html": [ + "1dc67487f20996c01dac142c337c637199b18265", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [ + "b9706b2e97cb2e73ac9f92c3cf378247a021e449", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [ + "d2c59b9b21829024476ab711920c93bc7aab292b", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html": [ + "622014b32f45aa1d5a862f9b480c44c70d9cd680", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html": [ + "14a3ba6ee99e0e33c72e792b6908360f8655c88c", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html": [ + "ebd5d9d37a3357b243a4faec5e0a7286ae7e9d45", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html": [ + "f43c0fee1591551aae5073da69ec8e5288ad4f1a", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + "0523759326ac73573be6a5f24e1e76f0bdf4e2d2", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + "acc82cd1e4946c7773bb5f4b5f20f1e01e459769", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html": [ + "bb64c8dde076b64be41411545bec2711029ffb90", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html": [ + "f9e61b0d0b0493410a32d6a57e6cd81b5985bb36", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ + "dd962996b6bceb901de95033b535a5164ee3cc97", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [ + "086170ddb356d8b146ba65c7354a086a6537ff07", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [ + "2c85597e74590dd456bde3496f3790b45348f29d", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [ + "dc82efdc22d6cef29a1c02477ea9aa52c7108f98", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html": [ + "a11264d5617b6c7cf04d541f1138b53d89a7ffad", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html": [ + "c11c20ec931bb253da23aa65acaf38bc22d97f9e", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html": [ + "5bffc46598f6d60a356264b8eae2abd99e45d887", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html": [ + "3b82d9728ef1056844631400db6ec166996bb056", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html": [ + "fa6b1d59800974155cd01b944e83ea0aa4ebb9a1", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html": [ + "ddc6b7e13cca44312ca7e28b9b1fd88940b8b9bc", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [ + "df563dfebbd211ca2718ec47e7066a21394f158a", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [ + "a478223906d04f890c4d324143f67ad060e5b17f", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/same-http.swap-origin.http.html": [ + "b4073ef0a36336c575c87fa5f9db0e810786cbe9", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/same-https.keep-origin.http.html": [ + "7833ba4b13dd875b9f88334b04c879c80b351bab", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/same-https.no-redirect.http.html": [ + "b70d023499011338a18ec459ed30e1789e1badaf", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/same-https.swap-origin.http.html": [ + "01061cef58530d406eb72d0e528b9e6f40612353", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/a-tag/cross-http.no-redirect.http.html": [ + "85ba98a94cd8d0aae23e8994ab2957e1d768aca7", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/a-tag/cross-https.no-redirect.http.html": [ + "f4d43d42482a011da26acd3537c89163eb533cec", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/a-tag/same-http.no-redirect.http.html": [ + "5e62712e49fee15d80faac3f8cb57433f72bf414", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/a-tag/same-https.no-redirect.http.html": [ + "b22a3e5b33a3f6a9538c799b70868ee39f16d76e", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/fetch/cross-http.keep-origin.http.html": [ + "a8c4d2b17b404c3aa029f1fa7f93cfe5ac620f1f", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/fetch/cross-http.no-redirect.http.html": [ + "d8ffe31bc56718f4a8dfc4646ad573e4bef98511", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/fetch/cross-http.swap-origin.http.html": [ + "30b516520513bf72c8c351a780ea38d9782a00da", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/fetch/cross-https.keep-origin.http.html": [ + "e24e250cf31b4e84aa861c426ee4048ff9a74986", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/fetch/cross-https.no-redirect.http.html": [ + "cacc4b78fe0d440c66f66af60e34169454559252", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/fetch/cross-https.swap-origin.http.html": [ + "9a3139094e861144c371fcb9cc1f6b6f101bcb49", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/fetch/same-http.keep-origin.http.html": [ + "89736d097b75f2d4d8208b7cfe18cdcaebcf1482", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/fetch/same-http.no-redirect.http.html": [ + "2255304631b0df38dc4ea30a433b52d2a261db8b", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/fetch/same-http.swap-origin.http.html": [ + "bc09cd95f451182c7d7b7952d419e2522f3fbb76", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/fetch/same-https.keep-origin.http.html": [ + "d4b5986ca62ae2969976f08d11a5b518be2706eb", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/fetch/same-https.no-redirect.http.html": [ + "cd047a55f1a29e52d62d2477003bd885c6400d08", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/fetch/same-https.swap-origin.http.html": [ + "f64b9357f7d0b6bfb2a4d5883d78baf33824fe36", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/iframe-tag/cross-http.keep-origin.http.html": [ + "2aa31ab673a9182fb2e2f831344fae3a12e7ba29", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/iframe-tag/cross-http.no-redirect.http.html": [ + "f0475e765b9a02203ceed6755b25d8e9abfeb2c0", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/iframe-tag/cross-http.swap-origin.http.html": [ + "75de729976d99f8dcfc89d633a81f99d05211eac", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/iframe-tag/cross-https.keep-origin.http.html": [ + "f10df76268b9e7f086fb14acb6d1209cac040ffe", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/iframe-tag/cross-https.no-redirect.http.html": [ + "08697c2ec1db99cd41bf0996786aa8d3d4e65851", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/iframe-tag/cross-https.swap-origin.http.html": [ + "0e92d11f2f75fd1c057143e069a33676f5ff2781", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/iframe-tag/same-http.keep-origin.http.html": [ + "af48e784e8033fc9121fdba0599013c02d51200b", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/iframe-tag/same-http.no-redirect.http.html": [ + "6cf5381725f30834294d931845e8498d2bdeeca8", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/iframe-tag/same-http.swap-origin.http.html": [ + "597672c3e3145bb7162399b0167587ced1ded995", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/iframe-tag/same-https.keep-origin.http.html": [ + "155287e874aef9f0bb6376f5fb8207994b8194e4", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/iframe-tag/same-https.no-redirect.http.html": [ + "3bf5aa8ed1aa9df3480e87136fe33128867775ae", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/iframe-tag/same-https.swap-origin.http.html": [ + "1c054a2c5250029d9ccd7fb85ab02ac23ac5ea11", + "testharness" + ], "referrer-policy/gen/srcdoc.meta/origin/img-tag/cross-http.keep-origin.http.html": [ "c6b74361d5a0f5f61ecfdccf6ef4614261cdeae7", "testharness" @@ -708697,6 +739698,226 @@ "812ce1d19e71f2ee2dc359bb671e76e12a8625f9", "testharness" ], + "referrer-policy/gen/srcdoc.meta/origin/script-tag/cross-http.keep-origin.http.html": [ + "7fbf73d223579427a4e51c4d9061840ff6721776", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/script-tag/cross-http.no-redirect.http.html": [ + "32f4101faa70daf03078b95201d4e35d5334f510", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/script-tag/cross-http.swap-origin.http.html": [ + "0b1b5e7aa1db927a0c24afd328f376cba8bb6e22", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/script-tag/cross-https.keep-origin.http.html": [ + "36c93ecbe03d0ffc59eaf6b0423f27c2b6ac030b", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/script-tag/cross-https.no-redirect.http.html": [ + "c8dc3a32df87558487a0052bbf5539fb6fdfd340", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/script-tag/cross-https.swap-origin.http.html": [ + "6482d0143ec3cded939616316cc735c8724aedce", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/script-tag/same-http.keep-origin.http.html": [ + "0d0f8b3ef2b9884fbeb87aea2fe9e39cbd044dfe", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/script-tag/same-http.no-redirect.http.html": [ + "d7c326118f0ee3b5437dc4ee7ca6a8ac94bc5dc5", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/script-tag/same-http.swap-origin.http.html": [ + "3fc83a5e58a09f6c8d623eb3a4021300035c5194", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/script-tag/same-https.keep-origin.http.html": [ + "41d9601752921a4b5b0dd2f125e9df7cd95234d7", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/script-tag/same-https.no-redirect.http.html": [ + "140165ed81c4291d0c750f7b122570a4d3a9b1cd", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/script-tag/same-https.swap-origin.http.html": [ + "83dd2e6ceae2b6779f15cf1c0e7e2aff0d40ac63", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/sharedworker-classic/same-http.keep-origin.http.html": [ + "453e4f734f7853a44b485f8c47106da824f499b6", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/sharedworker-classic/same-http.no-redirect.http.html": [ + "e3c4030dfc5b262b3ee2afb6f72f134e51e0981a", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/sharedworker-module/same-http.keep-origin.http.html": [ + "01103dd12b70ec7b11e201d34c1142d50d519a64", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/sharedworker-module/same-http.no-redirect.http.html": [ + "6339c6d630dcb73bd18e3e4f097c50abda807630", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/worker-classic/same-http.keep-origin.http.html": [ + "8f53f3da0dc37fccc063c493404884755ee1c7ad", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/worker-classic/same-http.no-redirect.http.html": [ + "06834c30bdb850e8e08ef41713be245a352ea09f", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/worker-module/same-http.keep-origin.http.html": [ + "b785bc0152d5cd10fd2c135c42d39ced8786c291", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/worker-module/same-http.no-redirect.http.html": [ + "c8f11d4eadc2987584cb6530277ebb5b50d1fd03", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/xhr/cross-http.keep-origin.http.html": [ + "cfa443de86606ebca72c8aad7ba81b5621e11eda", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/xhr/cross-http.no-redirect.http.html": [ + "231b63d3cf1193507c970bb7d398c7aa918b91fe", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/xhr/cross-http.swap-origin.http.html": [ + "bb31867ea322d83dbb37a43f6c0e6c1481004509", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/xhr/cross-https.keep-origin.http.html": [ + "9cbfcf13f7f30651d7f16969950a5d5e02746795", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/xhr/cross-https.no-redirect.http.html": [ + "48cd309e90323ab963e891f1c8c10b80ba9a0590", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/xhr/cross-https.swap-origin.http.html": [ + "644b19d059ec5c5ab32ebcf17faa3fc6f4dccdb1", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/xhr/same-http.keep-origin.http.html": [ + "78e99afd7ec486770cccdbef3353bf6274b212d1", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/xhr/same-http.no-redirect.http.html": [ + "780a93d1ff78cb95148dce8e768bf6ae0405e008", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/xhr/same-http.swap-origin.http.html": [ + "2e0126ba7b257fad0f640146ed12b5834df14814", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/xhr/same-https.keep-origin.http.html": [ + "e3827631b36f33b3ec622e361db915ae44437c1e", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/xhr/same-https.no-redirect.http.html": [ + "c084fccc8a351293ce285503f1a86ec44c36b368", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/origin/xhr/same-https.swap-origin.http.html": [ + "da4895ea1b296934b6f7a5a304563878c8b38913", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/a-tag/cross-http.no-redirect.http.html": [ + "b322d0d96a04834646a460b94798eda0f82abfdd", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/a-tag/cross-https.no-redirect.http.html": [ + "9ffe1dfbb889d1b97f7ad02b83af28ff563a9802", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/a-tag/same-http.no-redirect.http.html": [ + "351c8d1f83d5cd740e2dd9f7a49a33d24739c823", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/fetch/cross-http.keep-origin.http.html": [ + "d53d902779d8eb3e3cb589f5385c116c5a097f64", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/fetch/cross-http.no-redirect.http.html": [ + "c02d94cd0cf3936f8bbc367d91ce6efda5f846ef", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/fetch/cross-http.swap-origin.http.html": [ + "01358c3d971998052465b165c29408e7ed4acbaf", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/fetch/cross-https.keep-origin.http.html": [ + "58715c8a3c9566ffe393b94e2832153d094fa1c5", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/fetch/cross-https.no-redirect.http.html": [ + "3a97072bb4b0ff31a9a5f6b6028cd96828d3929c", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/fetch/cross-https.swap-origin.http.html": [ + "a12bc7d806ee65c8a2ff82fb57e803402e162b82", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/fetch/same-http.keep-origin.http.html": [ + "29fbaa58a3cee17613daf38c00e8812ec6e60013", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/fetch/same-http.no-redirect.http.html": [ + "53d471f99f0ad65712338e9bc62dfe1157e5f81e", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/fetch/same-http.swap-origin.http.html": [ + "a2caeb86af715a8323aab29c94c87bf1c0dd9096", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/fetch/same-https.swap-origin.http.html": [ + "b74a717e276761e656b3d3f7cd1eaccfad9c700e", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/cross-http.keep-origin.http.html": [ + "26839b535ad028d129b6c5bcb9477b22c7289eac", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/cross-http.no-redirect.http.html": [ + "8be9fee40418594808ea6e1fee652736d0646cd6", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/cross-http.swap-origin.http.html": [ + "c59b1d5148ad3c2c935b3d8ecad977c54a7426de", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/cross-https.keep-origin.http.html": [ + "fc454a5e056da2164fecc6621663aac065894bf9", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/cross-https.no-redirect.http.html": [ + "93c81c251b202a18ce191abf0291404d2ddc6fc7", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/cross-https.swap-origin.http.html": [ + "aaaa619c48463b9fc2cbcf584980e019a7fe1775", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/same-http.keep-origin.http.html": [ + "794c15b6de45d0a889b1979d871c97983f77bdd0", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/same-http.no-redirect.http.html": [ + "6755a5f83b6182b86a761a6cd5884fd27a6f4bde", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/same-http.swap-origin.http.html": [ + "7fab40d212d2b11a2a1233692ab68cb552dee6b1", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/same-https.swap-origin.http.html": [ + "39e6f548314fadeaa9efeb4592eb096063484f26", + "testharness" + ], "referrer-policy/gen/srcdoc.meta/same-origin/img-tag/cross-http.keep-origin.http.html": [ "e18fcc77d55292486c81676148b47a1269e7b830", "testharness" @@ -708737,6 +739958,230 @@ "6687a674b7a2fa79dae572929cb34e4c9cbad820", "testharness" ], + "referrer-policy/gen/srcdoc.meta/same-origin/script-tag/cross-http.keep-origin.http.html": [ + "f98839750d5f6238eae3ab381e6e1b1e0db9b972", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/script-tag/cross-http.no-redirect.http.html": [ + "41e66c1af2b9d1a80a3f151d5e4eaee051899ddd", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/script-tag/cross-http.swap-origin.http.html": [ + "ab8db0b395b2c66c975b8d555966fed8964a6687", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/script-tag/cross-https.keep-origin.http.html": [ + "1dddb4184d39eea0b8e765186747c765c856dd0a", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/script-tag/cross-https.no-redirect.http.html": [ + "fc4b91ccab064fd207cfd59d9c19eb5256278080", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/script-tag/cross-https.swap-origin.http.html": [ + "6253eaccee5a01c5e7f1ff8c14e3b82a5f42efe4", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/script-tag/same-http.keep-origin.http.html": [ + "5449f385b991a2772883d9ddf1884623ec37612d", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/script-tag/same-http.no-redirect.http.html": [ + "487d9f1f538ee3e4a53fed101dda6cc56e05cfd1", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/script-tag/same-http.swap-origin.http.html": [ + "d54c1bc2755d4d983c3191a2a4183bcda2bea32c", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/script-tag/same-https.swap-origin.http.html": [ + "b258eaab271a52a9a0cf526f81ffa190a569b021", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + "d98848602db1702b8b1f98c0c9f5c0a8320ed3c1", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + "f634eb8120eaf233772a1ae17868bbf032783f97", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/sharedworker-module/same-http.keep-origin.http.html": [ + "c9859f925d4bc9eb31592193a9b52065ac18e5ca", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/sharedworker-module/same-http.no-redirect.http.html": [ + "36733e0306713a3e863ca64c4c47c174bdc9c72d", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/worker-classic/same-http.keep-origin.http.html": [ + "9a7c6542bda311255697a69f515f31584a475ba0", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/worker-classic/same-http.no-redirect.http.html": [ + "508df58dfd7ee2508970938aae304957f69fd1d5", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/worker-module/same-http.keep-origin.http.html": [ + "9aca76c98564ab0408549571d79a01fb60e37fd5", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/worker-module/same-http.no-redirect.http.html": [ + "ce3c37b7ed6911d5fd8d8f6b7a673ad8d11d9c81", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/xhr/cross-http.keep-origin.http.html": [ + "67ad49392d8016bec2f9ea32fc5bbb7fd6b07314", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/xhr/cross-http.no-redirect.http.html": [ + "ac352c71672bd71dcfba44c98dbe9b9911e8130d", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/xhr/cross-http.swap-origin.http.html": [ + "bbb9d5b8a7d40388949c924e914ed3c8dda35837", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/xhr/cross-https.keep-origin.http.html": [ + "7b7863c9e3d6fe4c8ee944f8384ceef646e2ef7f", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/xhr/cross-https.no-redirect.http.html": [ + "f3ae9a17a28af44621f1c6952bf42c3f11d330e7", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/xhr/cross-https.swap-origin.http.html": [ + "5d0d30a356d19b0637c8117f387ae33417d49689", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/xhr/same-http.keep-origin.http.html": [ + "3621997477b687df7bff198e92be009db626c714", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/xhr/same-http.no-redirect.http.html": [ + "1999cbed712cc2e989041ffab47b249760bd7e4a", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/xhr/same-http.swap-origin.http.html": [ + "46a547afd76cb3bc62775e737655bee0433461f7", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/same-origin/xhr/same-https.swap-origin.http.html": [ + "4a5c2bb5e39c1d91dc41ae37536027b97ae8485e", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html": [ + "ca2a1b971531f989774535da465e654cbef8cc55", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html": [ + "64fd7ad5233b21e29deeb8ba8edc6396188e68b4", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html": [ + "4de4c4c4465506023588c10ff1386651b2beddbe", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/a-tag/same-https.no-redirect.http.html": [ + "1c952b34556133b07431aa2bc74cf6d8b15bc91f", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html": [ + "a3d629e2976658bcbb436ca3fafd12f2a780d5c6", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html": [ + "14624c935596b72f377edf00e5e6249638775b98", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html": [ + "ff1855f88a8d7f9cf14284335064ee60dca710e0", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html": [ + "05950819a0e775ea3209e722ce41558eb935e960", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html": [ + "b25dba78e122e0f14fcb4dd40f18c94e8031eaa2", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html": [ + "fe8e874748bc491ca945fa43405b06072e8ea815", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html": [ + "318df2c4569522ef62637947f3c8c21eb293f85c", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html": [ + "178fe9388e234cfdca3cc7a8542487cef8a28088", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html": [ + "e46e93379596b63e5fbf2334a17698dc726f88dc", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html": [ + "80a4d3d16c3200b0031a9990b8fa6de6a4d20bdc", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html": [ + "13d07ca62f3953192520baf5af70eb1af1a27079", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html": [ + "dfe920290de1b18d87b62873fbfa4a5563361f23", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html": [ + "290f111b8bc656f7dd019b6f75768f9c3b0f7880", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html": [ + "d0d72c46ca256a00622d9b9a13e8a7261c514461", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html": [ + "3d7474c5edee906303f35d75792e0f364a8437df", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html": [ + "4479da03a456af4794d482f4bb17a9b8d971d76e", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html": [ + "339871c59798e96cb910580a719fdef658fdc8f4", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html": [ + "41c0c9da6219e4ec9f8838e918a654f8a7623dab", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html": [ + "6773f2826792872a831d1816a43cf522e907f2b9", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html": [ + "4c3815de20f75a42248c64ca5e34c52144fb413e", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html": [ + "4daf031b50b392742655f0071972959e95dd0072", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html": [ + "17f1a0b9732d74c9aa81070790ac0f92a9dce96b", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html": [ + "1a8a664a1e84ac878d23f1a24924907f9b201d03", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html": [ + "4efb4b0c3ab5a1c897266a6c1e5c7ca1372bbc1b", + "testharness" + ], "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html": [ "1c0425ce109a9abaa3a972b178c69b60fde00890", "testharness" @@ -708785,6 +740230,246 @@ "26d31e7d02e119a00289d40a167947da3f814d55", "testharness" ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html": [ + "47ef5e50c776b29963d7efac6b77b5d731e13079", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html": [ + "dfdae02e8691488e9d515114e82971d775f6fa80", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html": [ + "2a5b00c2b7d38e85887edfd9e356e07adc36b1a5", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html": [ + "9d36cf40ecbc37e5fde255162250cd34e8232737", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html": [ + "aadd1e68ecbcd77d8c2ce946ec251ab92e0cc067", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html": [ + "f0971a199e4b2d23520085c5d48eb08bcca7b948", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html": [ + "e591965332000c1a755578ea1f1c268d14439e39", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html": [ + "9fd4c83a4aadd04894f0a95a031d19dbe202b7ae", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html": [ + "b0844d88da14ca6d7854392fbf41ce8502d32b7d", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html": [ + "82489de2932d9bab712198079e054d0fdebd9fa8", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html": [ + "a6a6ead26155786037231f0c0c07edbe3fcf27bb", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html": [ + "78c68e126d39fec6050a7d4fe7f497d6e1f31ff4", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + "c86adf0d3a7d665275a52c3ed87defbf258e9ffa", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + "ae607734d5a1c3c7e10192c7bfbfd8d30506e201", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html": [ + "f3f91636d0b17d9f8df33ca5e746388bc03ac6d4", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html": [ + "a6dd64283ba18fc472ee87679e31bf566ef00ffa", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ + "48edd50c3e7e7ec6f2cd6bc897f59168d39735b8", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html": [ + "576b48568c1868a7014c5bad8aeb0bee7e664deb", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html": [ + "d1b9d8c0d153bdb5e89c0feceeb2370d19e28c7a", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html": [ + "a88fc1d1d8318d41d73ddd14465546fd3c7c0b01", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html": [ + "125029681eb3ff912a0674ec7a606beb02c8b55d", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html": [ + "5eb2c4f909496247d47461dbdaacc3df90c7e533", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html": [ + "388e3a224077fc5c5383ee08acde42dad29d43de", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html": [ + "4b0bfa061c7cca2db3b15668f01f6dec3c09d340", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html": [ + "848ebc2bd675db84597426be1eb9bd58f210aea6", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html": [ + "fac0c8b56a007ab23ae66294ea95748a9fda0947", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html": [ + "7da566073070493e6323ce63037c7a837650ce85", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html": [ + "cc25fb06b1c599ece86e25d5770b4926a3b2d4e8", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html": [ + "ba0afedac296b2ab15f3739f47530eac647b68e9", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html": [ + "3b50bd1bf06e3b2f51f1e98c4afaa6a0c9408b64", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html": [ + "975f3586f05cfa39dc820565882853bc42e06b7a", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html": [ + "e7516c78b10e32f7d5ddf9b4dd580e62c7612205", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/a-tag/cross-http.no-redirect.http.html": [ + "561cd207dd186df75734efcc6ac759649f85ac5c", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/a-tag/cross-https.no-redirect.http.html": [ + "4ed7f8927db98ed64c0d038f4c37e4aad9324788", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/a-tag/same-http.no-redirect.http.html": [ + "c7acb1395d9fe15edb2bbe96b2197035406c9658", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/a-tag/same-https.no-redirect.http.html": [ + "b1778a82f2125526588cbf15936197325c0dd7de", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/fetch/cross-http.keep-origin.http.html": [ + "d4e325b62a97bf4fecebf6d3f2f63d0cbcd2d8f4", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/fetch/cross-http.no-redirect.http.html": [ + "b34e4d525a29b6fa80853bfc9d3b5692ff0f87d9", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/fetch/cross-http.swap-origin.http.html": [ + "baea1207538224e85e0b83ca2dc26495e0333709", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/fetch/cross-https.keep-origin.http.html": [ + "78e002fc3b6de4569b5e7921d47c734bfc85e37a", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/fetch/cross-https.no-redirect.http.html": [ + "3cf9d67008cd60a2c64dbafc9310dda32b9eeb20", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/fetch/cross-https.swap-origin.http.html": [ + "dd8fdbfa678d3b057e9cf8d707dba474381f6bbc", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/fetch/same-http.keep-origin.http.html": [ + "d5fdf5b7d0a25ecdbf6515ab1fac995902a1d49c", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/fetch/same-http.no-redirect.http.html": [ + "a285d5a2a309c533460f647549619939cb68261d", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/fetch/same-http.swap-origin.http.html": [ + "81c4243b48575df3cab79eb4722c92f1755ac591", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/fetch/same-https.keep-origin.http.html": [ + "8105d43b93e661456899cf1286d6994e9969deb8", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/fetch/same-https.no-redirect.http.html": [ + "79b37f9f086868c52c27496ce734587d0ff61bdd", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/fetch/same-https.swap-origin.http.html": [ + "8875e2fca0b2e0b9c54b5dd0a5731e9a5e455c82", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/cross-http.keep-origin.http.html": [ + "337fec90c5abf57195937a22e24d44de8b36c096", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/cross-http.no-redirect.http.html": [ + "cb5fe948a74026951cb4638c93e120595c649e9d", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/cross-http.swap-origin.http.html": [ + "21bf064ca6d384520e77fb062e3816c74584b14a", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/cross-https.keep-origin.http.html": [ + "ea6702b09b00f6bd03c64b0bfcd55a4213ac0b3a", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/cross-https.no-redirect.http.html": [ + "867d0884509256a637376e65bf6f145619269c82", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/cross-https.swap-origin.http.html": [ + "f519d7d2ed3b943015143e6c0091b6c4f6bed511", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/same-http.keep-origin.http.html": [ + "5a97fd9a1cacb55c2af7aa922a80bc2b0e1d567b", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/same-http.no-redirect.http.html": [ + "a610c950e0cdf2dde70fa521fdae394c596389d5", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/same-http.swap-origin.http.html": [ + "2156890dcc539d4e9a1b7dd8521c8526e9df8b0c", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/same-https.keep-origin.http.html": [ + "7696aa2e66b0482868fa443091f95dcbdf354fd2", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/same-https.no-redirect.http.html": [ + "9385cf807e08986b1e852e720767783cb840ed0b", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/same-https.swap-origin.http.html": [ + "5344680a4130dcdc5540144497031e4146c8c07d", + "testharness" + ], "referrer-policy/gen/srcdoc.meta/strict-origin/img-tag/cross-http.keep-origin.http.html": [ "b898c979e966c615f344950223ad8bea9c391a4f", "testharness" @@ -708833,6 +740518,246 @@ "538334723522e3a705b6e126b7f35fb9742a248a", "testharness" ], + "referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/cross-http.keep-origin.http.html": [ + "c99c78b4a695cbdf39188f9527fbc1b7eab6e67c", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/cross-http.no-redirect.http.html": [ + "7997911057b8d5c62dd96be21288645817222d7d", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/cross-http.swap-origin.http.html": [ + "69b3340ed3e38c30807b98c5f3f26fb96973a8ad", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/cross-https.keep-origin.http.html": [ + "ddc9991a681a2e3aa5fcb6fc5b943d51d2410ab4", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/cross-https.no-redirect.http.html": [ + "a48d942fbe7fd6aad2a5d5b010cfbf4725d17558", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/cross-https.swap-origin.http.html": [ + "1941a1e7ebff92a3a53f8dfe5e1852fb30d87033", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/same-http.keep-origin.http.html": [ + "27b15101b2d2a81e97797ce4ce1e7f52cc9c9826", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/same-http.no-redirect.http.html": [ + "edd0fd7eb21210c944f5e2df1f41c9829b3efda3", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/same-http.swap-origin.http.html": [ + "d07b8938675c95defda641ccec9bdd64270096f0", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/same-https.keep-origin.http.html": [ + "c2d61e41da7ca409be03bb647b72a41fba3e4deb", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/same-https.no-redirect.http.html": [ + "fe93a6bb3fccc04ebeb701f6ce1a2478d6ae56f9", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/same-https.swap-origin.http.html": [ + "20da99760a13df3600eccd2224d4dd72e345c9f4", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/sharedworker-classic/same-http.keep-origin.http.html": [ + "27186b188cc7f337667099037da5268ceaaf03b5", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/sharedworker-classic/same-http.no-redirect.http.html": [ + "0e49e246346f9d654c4f51534994765628fb241a", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/sharedworker-module/same-http.keep-origin.http.html": [ + "2691eec477f232b6ff99b05dddb147b749e862a7", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/sharedworker-module/same-http.no-redirect.http.html": [ + "a2dc417f6ec91c7c454df8467411f2acd54abd79", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/worker-classic/same-http.keep-origin.http.html": [ + "5098efe85abc7e5d74417dcba712f7ca428875a8", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/worker-classic/same-http.no-redirect.http.html": [ + "ab5bea5fa30422bdfddf4da3284408e9a631f365", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/worker-module/same-http.keep-origin.http.html": [ + "5ac168dd73d74645bcce9d235d538466315652dd", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/worker-module/same-http.no-redirect.http.html": [ + "75ba8e5705bf91cb8b9c5dedfe1ac37bdee7e540", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/xhr/cross-http.keep-origin.http.html": [ + "d20223a368afc11ed211bb1cea5f539969e45b75", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/xhr/cross-http.no-redirect.http.html": [ + "46ef564b09c992099b152df8abbc768a8298ac8f", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/xhr/cross-http.swap-origin.http.html": [ + "2541a9049ca5cd1f7436f91c5f068b2fd60ad0db", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/xhr/cross-https.keep-origin.http.html": [ + "35e9a55d56be8a38a8e9ccfeb9d644f77f7bf734", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/xhr/cross-https.no-redirect.http.html": [ + "0c3c0973641216031a9191459d7a4d10cd77b6fc", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/xhr/cross-https.swap-origin.http.html": [ + "3eb6500e3af00cbd812e5d666da4693d8373b1d5", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/xhr/same-http.keep-origin.http.html": [ + "e33c95c47a85e1413e37380314bc0ec37e473978", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/xhr/same-http.no-redirect.http.html": [ + "d69e0c2e5678e3af3001fe588b0d1e929df7f4aa", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/xhr/same-http.swap-origin.http.html": [ + "9b85f353385b6f4af4e98a1af377658423224f86", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/xhr/same-https.keep-origin.http.html": [ + "5a90c5c6d33c4efc63a54b30f5d6ba404fb07e0c", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/xhr/same-https.no-redirect.http.html": [ + "ca79e1b7f2f8845729259808b24bf89636eea1fc", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/strict-origin/xhr/same-https.swap-origin.http.html": [ + "40c4ee402c5e879fa3aff2ad5baf1ce5605f742c", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/a-tag/cross-http.no-redirect.http.html": [ + "122cee47d2892cbd4d6dc2f0fce55fdaacd3ade0", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/a-tag/cross-https.no-redirect.http.html": [ + "dd6454a3f5bc7bc28af05e02a2fffb2a9e7add8c", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/a-tag/same-http.no-redirect.http.html": [ + "951ff0cfcfaa33512bae75d8ccbcc6bbd97c882a", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/a-tag/same-https.no-redirect.http.html": [ + "645a7522aa593ac827900263a2258b6275c76fb0", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/cross-http.keep-origin.http.html": [ + "56c63ee4468f8f6c46b7d1e7547f22fe0e1bade4", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/cross-http.no-redirect.http.html": [ + "d76670f27025ad7766928704192294cfa021d8fd", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/cross-http.swap-origin.http.html": [ + "7eceb16e630707cdf805e44d208cadfba7d0d683", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/cross-https.keep-origin.http.html": [ + "ed5ed077350a8d0500aee5d92375ad5a615d11ce", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/cross-https.no-redirect.http.html": [ + "cb1eee5e1680464a2695066e0dadf768e81efc60", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/cross-https.swap-origin.http.html": [ + "9095eb6a60186a8e27e514c710a993c6a45639e8", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/same-http.keep-origin.http.html": [ + "36a791d6f2bef9206f7107cab4c9b251f0a9e292", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/same-http.no-redirect.http.html": [ + "2475c98b8d6e9f8f5966112b1077c6e4dc58cd01", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/same-http.swap-origin.http.html": [ + "7e493bb755e11b7733c922fe07d897c2a0181db3", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/same-https.keep-origin.http.html": [ + "15dcfe9e861921fb0fb23fd8836ed77b06c85c63", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/same-https.no-redirect.http.html": [ + "4d25968093a4eafb1ee98d38f2c35bf294ec6bf7", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/same-https.swap-origin.http.html": [ + "59ab310bf87acdf2a16b22ff4c7fcc27ed8a9fa8", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html": [ + "0e98bc460c183bfc2948e184c821feb7f03b467b", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html": [ + "cab9d79ffe725dffda8b9ecaaf2fc3889b7272ef", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html": [ + "0b28e9870f88e0419362e9e13cd2ded6f2263490", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html": [ + "0358262f7bc86b77987adb61461284a4dca1c83c", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html": [ + "d4107b4097c4d927e1db6c7c5ef4c356a51aa4d4", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html": [ + "c647c58c119e30b899288aa0bc81b281bf2099aa", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html": [ + "d905791e9eb7f9657b9f5f6bc45c5f80a685aa27", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html": [ + "eeac9db1064f1bcacc8d9ac755f5487ae9716c2b", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html": [ + "9d76a0e68fac55a7cabb9f4b97105b6d6088327d", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html": [ + "f219b56bdf959f56c8cb309bf116044a19affb66", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html": [ + "384a9905b9df8d226a2b3fc70efb805d954cfac5", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html": [ + "3dfaf83ba9c8c72194874a9af864863b3b06a08d", + "testharness" + ], "referrer-policy/gen/srcdoc.meta/unsafe-url/img-tag/cross-http.keep-origin.http.html": [ "949ed772ff54f7591d9d0f3ef5a8bea0e98dbb12", "testharness" @@ -708881,6 +740806,134 @@ "e634871612c91ede938dad5ab2fbb78a456d178e", "testharness" ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html": [ + "4a28d8e718d6da8d4086224949f12556c8b37e89", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html": [ + "d65d5be25f868ea6140f4cde319c42a40c41baff", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html": [ + "f0a4d9d949279a82eb51ada38e0e4928f3a25fab", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html": [ + "9aff64848eed753efb02dfdea540257154dfab2e", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html": [ + "40ffdfad30d79ed39e2d4fb9e1624bde3bae2b1c", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html": [ + "6756001846a85ed27533d389e7db341cc31539d1", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/same-http.keep-origin.http.html": [ + "8aa74fae5568bef179421bffe0b3792b5422239c", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/same-http.no-redirect.http.html": [ + "e93147004f7f8c554a89bdcd98c389955f917a56", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/same-http.swap-origin.http.html": [ + "01b6d58e85a102be2f7be519c754075ab9b62cae", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/same-https.keep-origin.http.html": [ + "853b344357114e1936ebc06b5f759adf10f6a8da", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/same-https.no-redirect.http.html": [ + "d951789c98aec2ca0237940de57f03003eff18ff", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/same-https.swap-origin.http.html": [ + "cb7d97f25ba80d09a2feb1c30ff98e488f392c40", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html": [ + "4f907d6f594880d0abde72da0c0e55dde95e749a", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html": [ + "a1fb641d94aa08cb68dbaf57777d5490319579d5", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/sharedworker-module/same-http.keep-origin.http.html": [ + "a1b0e43ebe39efbea362f828eec0e38bd92b5051", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/sharedworker-module/same-http.no-redirect.http.html": [ + "39cf68c282eebc85357060086380017e24005e64", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html": [ + "036fb39f0e099766dee6a7f1c588148f1eaf88f2", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html": [ + "dcfd35a865fa67e18127fa9b3b21dbb2259b95b5", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/worker-module/same-http.keep-origin.http.html": [ + "595d1d01ffec42be83cb938c96c5818a89ad980e", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/worker-module/same-http.no-redirect.http.html": [ + "c5102b792026426e050766933d7cbdaad875f8df", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/cross-http.keep-origin.http.html": [ + "94d203b046cf868c4728f48c0bb947fe3dc493d0", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/cross-http.no-redirect.http.html": [ + "9b38e34562ca41bf3a9cd7c1e767964ec979e749", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/cross-http.swap-origin.http.html": [ + "e081cadedb3d0e45fdb44350ae1a0fb9045ef8f9", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/cross-https.keep-origin.http.html": [ + "2a9057f53a83f2821ac6126fd0881b52c7e0b26a", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/cross-https.no-redirect.http.html": [ + "ffcab5bd5a7b7985836f4a359ed55196196b22c1", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/cross-https.swap-origin.http.html": [ + "4acc4ec24ae3750c533fff5c5c5a46985eea73ee", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/same-http.keep-origin.http.html": [ + "5d270d5367bb89a12f28c5fe59c39a211667265b", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/same-http.no-redirect.http.html": [ + "6ddbee09cb6a882bc27a2a634f6824c8407d89ba", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/same-http.swap-origin.http.html": [ + "246d54d11e86cda16ba24115d8248910674ee9d5", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/same-https.keep-origin.http.html": [ + "680b9ffe75fb280ad460273229f834ef3ca712be", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/same-https.no-redirect.http.html": [ + "44015b3d435376f51422a386032820602232e68b", + "testharness" + ], + "referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/same-https.swap-origin.http.html": [ + "fb427fc8e5446d073715b3c9b4c3bbeaf591190e", + "testharness" + ], "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html": [ "6c9682c6b2484f012ed8e5436390c197bc7e013d", "testharness" @@ -709313,6 +741366,22 @@ "180358e691bd449b825e0c8f199d919dbd90c270", "support" ], + "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html": [ + "6c11d2b6b56accdc5979b0106d0bff62e4b9a775", + "testharness" + ], + "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], + "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html": [ + "5131a5fc90fd6ddb0e1006a68646429089a12044", + "testharness" + ], + "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html.headers": [ + "180358e691bd449b825e0c8f199d919dbd90c270", + "support" + ], "referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html": [ "a6f8057809dbf1abbc6bf76b6bf920e3de8f52ff", "testharness" @@ -709873,6 +741942,22 @@ "b3b55087edbb50ad0a371ebb45776cf9943033ae", "support" ], + "referrer-policy/gen/top.http-rp/no-referrer/sharedworker-module/same-http.keep-origin.http.html": [ + "6deade61026f2651d6d145ebd9c5673e277d2e40", + "testharness" + ], + "referrer-policy/gen/top.http-rp/no-referrer/sharedworker-module/same-http.keep-origin.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], + "referrer-policy/gen/top.http-rp/no-referrer/sharedworker-module/same-http.no-redirect.http.html": [ + "50452b28d023dbfec86da50cc55c0a8c0b7dbee4", + "testharness" + ], + "referrer-policy/gen/top.http-rp/no-referrer/sharedworker-module/same-http.no-redirect.http.html.headers": [ + "b3b55087edbb50ad0a371ebb45776cf9943033ae", + "support" + ], "referrer-policy/gen/top.http-rp/no-referrer/worker-classic/same-http.keep-origin.http.html": [ "95b183366aeac9b40c4142859cf32de28d56acf5", "testharness" @@ -710433,6 +742518,22 @@ "a15ea7c65c8647c29e5ac992286568aa8dc013f5", "support" ], + "referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html": [ + "5b1fa137f0376f2afba2e45ca27f0773a89252bf", + "testharness" + ], + "referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], + "referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html": [ + "14ba28acaa374c41e96d31b9f909642994208907", + "testharness" + ], + "referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html.headers": [ + "a15ea7c65c8647c29e5ac992286568aa8dc013f5", + "support" + ], "referrer-policy/gen/top.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ "45589e04506bc01b3c1c326f2860440c625954d7", "testharness" @@ -710993,6 +743094,22 @@ "ecff74b90dc209912b003388bcac7ca584b12762", "support" ], + "referrer-policy/gen/top.http-rp/origin/sharedworker-module/same-http.keep-origin.http.html": [ + "a97b4df1a40abcbb729ca5d9f429f6b30c764b19", + "testharness" + ], + "referrer-policy/gen/top.http-rp/origin/sharedworker-module/same-http.keep-origin.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], + "referrer-policy/gen/top.http-rp/origin/sharedworker-module/same-http.no-redirect.http.html": [ + "5f5ef2f76bf20805fbb7e79027f5ff68bcf01e9a", + "testharness" + ], + "referrer-policy/gen/top.http-rp/origin/sharedworker-module/same-http.no-redirect.http.html.headers": [ + "ecff74b90dc209912b003388bcac7ca584b12762", + "support" + ], "referrer-policy/gen/top.http-rp/origin/worker-classic/same-http.keep-origin.http.html": [ "f209c5c14163c340da09dba9fd36c014bacf2c4c", "testharness" @@ -711481,6 +743598,22 @@ "be66cf9321103b1397670f3acc89cecc09aabec2", "support" ], + "referrer-policy/gen/top.http-rp/same-origin/sharedworker-module/same-http.keep-origin.http.html": [ + "d1f75700bd1af56d33c3910072ed7a842655694c", + "testharness" + ], + "referrer-policy/gen/top.http-rp/same-origin/sharedworker-module/same-http.keep-origin.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], + "referrer-policy/gen/top.http-rp/same-origin/sharedworker-module/same-http.no-redirect.http.html": [ + "096d609d546190428f9796df10d027c2c7bc5441", + "testharness" + ], + "referrer-policy/gen/top.http-rp/same-origin/sharedworker-module/same-http.no-redirect.http.html.headers": [ + "be66cf9321103b1397670f3acc89cecc09aabec2", + "support" + ], "referrer-policy/gen/top.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html": [ "5ee8e5e26f3355fbf1cd8786b8d3ab8a98071915", "testharness" @@ -712025,6 +744158,22 @@ "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", "support" ], + "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html": [ + "d2b2301c944e44ed7e1e3300d3acca34660352ca", + "testharness" + ], + "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], + "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html": [ + "877bc33d9111d645679751fb9719bd32c1475d7b", + "testharness" + ], + "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html.headers": [ + "4cff1d12f82e028f7f1e9616bfb539ffb75b1df1", + "support" + ], "referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ "c7382dc23f796fb2a23931fd2cf4406f02fafbb9", "testharness" @@ -712585,6 +744734,22 @@ "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", "support" ], + "referrer-policy/gen/top.http-rp/strict-origin/sharedworker-module/same-http.keep-origin.http.html": [ + "ec2c9f2fbd5644f6fc37193212680df2beefaaea", + "testharness" + ], + "referrer-policy/gen/top.http-rp/strict-origin/sharedworker-module/same-http.keep-origin.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], + "referrer-policy/gen/top.http-rp/strict-origin/sharedworker-module/same-http.no-redirect.http.html": [ + "8cd322a038273b9199cce28017bdfc23bb4b2ec0", + "testharness" + ], + "referrer-policy/gen/top.http-rp/strict-origin/sharedworker-module/same-http.no-redirect.http.html.headers": [ + "1c32fba5a1e23d2800e6a00311cd58e8b70ec130", + "support" + ], "referrer-policy/gen/top.http-rp/strict-origin/worker-classic/same-http.keep-origin.http.html": [ "a7b5b0136e7ef131a7423bdd6ac934fbbb511840", "testharness" @@ -713145,6 +745310,22 @@ "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", "support" ], + "referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-module/same-http.keep-origin.http.html": [ + "622dc9211a06cf3513e7fe3118ed0ef5dd118da7", + "testharness" + ], + "referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-module/same-http.keep-origin.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], + "referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-module/same-http.no-redirect.http.html": [ + "2eb2fe65e9f53bdd975d4d48674fcb0715872fb1", + "testharness" + ], + "referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-module/same-http.no-redirect.http.html.headers": [ + "c1d3fd1a0be2609a6939653a3f4ce6f5036b6286", + "support" + ], "referrer-policy/gen/top.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html": [ "f9ae9653951c6b8b54aeed8abe5487d200eaae20", "testharness" @@ -713489,6 +745670,14 @@ "8cfd6e34217d415ee1ec505bf495866dc1d60123", "testharness" ], + "referrer-policy/gen/top.http-rp/unset/sharedworker-module/same-http.keep-origin.http.html": [ + "133fcdef1fff74e90f358b68e17ad164b3ead4d1", + "testharness" + ], + "referrer-policy/gen/top.http-rp/unset/sharedworker-module/same-http.no-redirect.http.html": [ + "a7c8c00c795263588a8aea694e47de8270b4a553", + "testharness" + ], "referrer-policy/gen/top.http-rp/unset/worker-classic/same-http.keep-origin.http.html": [ "6fc428e4dd5f2a590ba46a58dd2a767f9fa3bca6", "testharness" @@ -713769,6 +745958,14 @@ "70c909edabc9a0dc90cb601161d420a161bafe42", "testharness" ], + "referrer-policy/gen/top.meta/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html": [ + "d9a524d216bf7df8e73af22223190380c7655da0", + "testharness" + ], + "referrer-policy/gen/top.meta/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html": [ + "488613c2b13b55e57fd065898a1533dff8d3b636", + "testharness" + ], "referrer-policy/gen/top.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html": [ "491eb5ebe8675213b007c819b8b2c9e622f30007", "testharness" @@ -714049,6 +746246,14 @@ "55d41d7ab42224670e2f3ee65d801fe9d0852860", "testharness" ], + "referrer-policy/gen/top.meta/no-referrer/sharedworker-module/same-http.keep-origin.http.html": [ + "372b3c2dea9c797a9cae5373b3016cbbf67b9889", + "testharness" + ], + "referrer-policy/gen/top.meta/no-referrer/sharedworker-module/same-http.no-redirect.http.html": [ + "96c2ba8ed3a76fce5469f7ca5beaa8424685e7b9", + "testharness" + ], "referrer-policy/gen/top.meta/no-referrer/worker-classic/same-http.keep-origin.http.html": [ "0160add32748c5cb183df1fd9b20ae65e249ceee", "testharness" @@ -714329,6 +746534,14 @@ "bc4f919b5c56d2612d72c568966ba16703362245", "testharness" ], + "referrer-policy/gen/top.meta/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html": [ + "9134e575973ebef7514ca5afb5af861418a64dd6", + "testharness" + ], + "referrer-policy/gen/top.meta/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html": [ + "77319d8c3ef4dfa814085cdd4a35136ce8cbb6fa", + "testharness" + ], "referrer-policy/gen/top.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ "42d190582efc53b570ac44dce8e0f88516338b29", "testharness" @@ -714609,6 +746822,14 @@ "480fc6cc63f982e335a2e2b60d12ff834c1f4492", "testharness" ], + "referrer-policy/gen/top.meta/origin/sharedworker-module/same-http.keep-origin.http.html": [ + "c20c391579170875206abc3f4a3b7903fce7b7b2", + "testharness" + ], + "referrer-policy/gen/top.meta/origin/sharedworker-module/same-http.no-redirect.http.html": [ + "b7565c9d50d353baae6610fe2fae61cd9a16e631", + "testharness" + ], "referrer-policy/gen/top.meta/origin/worker-classic/same-http.keep-origin.http.html": [ "3053f3001e707dadd32b769c0ce214dec6a7afc7", "testharness" @@ -714853,6 +747074,14 @@ "f734c5274300a73737fd8ec4a692be5f24430648", "testharness" ], + "referrer-policy/gen/top.meta/same-origin/sharedworker-module/same-http.keep-origin.http.html": [ + "e1a9d5577360711559c203a1bfa9ef234d90d279", + "testharness" + ], + "referrer-policy/gen/top.meta/same-origin/sharedworker-module/same-http.no-redirect.http.html": [ + "30e1cb54cd98e063b64f765b563664663610353c", + "testharness" + ], "referrer-policy/gen/top.meta/same-origin/worker-classic/same-http.keep-origin.http.html": [ "410e398776a09e750544de1caa5efdae35840229", "testharness" @@ -715125,6 +747354,14 @@ "e3332c01506477ea572fdade000809c92171f4ab", "testharness" ], + "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html": [ + "0e552163f42423187f3181bee3e5060baf4fc4e3", + "testharness" + ], + "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html": [ + "9535b9672d797c183af847baade82a71ea92ad4c", + "testharness" + ], "referrer-policy/gen/top.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html": [ "57bac4ca139f7372f81c58a1ccc9f5e2d41fc8e1", "testharness" @@ -715405,6 +747642,14 @@ "eb2572bbf7e398c31aec535d4642757b8f8ea752", "testharness" ], + "referrer-policy/gen/top.meta/strict-origin/sharedworker-module/same-http.keep-origin.http.html": [ + "d9972bee6db86d6bf9f90e3e098bf74fe3d5787c", + "testharness" + ], + "referrer-policy/gen/top.meta/strict-origin/sharedworker-module/same-http.no-redirect.http.html": [ + "e08aa96dbf502aff2034e6991c29d5e463198148", + "testharness" + ], "referrer-policy/gen/top.meta/strict-origin/worker-classic/same-http.keep-origin.http.html": [ "46f300c1d7bd171f1557d94a5a44b216e44c57d3", "testharness" @@ -715685,6 +747930,14 @@ "a891328397f6994a9fe7222f7e9d6cf6161479cb", "testharness" ], + "referrer-policy/gen/top.meta/unsafe-url/sharedworker-module/same-http.keep-origin.http.html": [ + "cce34ecbed1ad983a2da6c0c27eded3f8bd1cac8", + "testharness" + ], + "referrer-policy/gen/top.meta/unsafe-url/sharedworker-module/same-http.no-redirect.http.html": [ + "fb448d685d91f58406bdb8607beb3a7f4a24de34", + "testharness" + ], "referrer-policy/gen/top.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html": [ "5f642933acdfe3b689268706904963204b3bdb6e", "testharness" @@ -715965,6 +748218,14 @@ "8cfd6e34217d415ee1ec505bf495866dc1d60123", "testharness" ], + "referrer-policy/gen/top.meta/unset/sharedworker-module/same-http.keep-origin.http.html": [ + "133fcdef1fff74e90f358b68e17ad164b3ead4d1", + "testharness" + ], + "referrer-policy/gen/top.meta/unset/sharedworker-module/same-http.no-redirect.http.html": [ + "a7c8c00c795263588a8aea694e47de8270b4a553", + "testharness" + ], "referrer-policy/gen/top.meta/unset/worker-classic/same-http.keep-origin.http.html": [ "6fc428e4dd5f2a590ba46a58dd2a767f9fa3bca6", "testharness" @@ -718098,7 +750359,7 @@ "support" ], "referrer-policy/generic/spec_json.js": [ - "27961c5de5c1b488e87dd52e1c79a5afa7070e7b", + "a8b723d5a98f9748689faf31e95bd2c7a887b079", "support" ], "referrer-policy/generic/subresource-test/area-navigate.html": [ @@ -718146,7 +750407,7 @@ "testharness" ], "referrer-policy/spec.src.json": [ - "b0e07eb132861688d58126ab506afb4c8de03256", + "d32ee80a8d2ce1edd57b09f919732eefa4f6caeb", "support" ], "remote-playback/META.yml": [ @@ -725425,6 +757686,38 @@ "56f67dc5ed1ceeeea347b703f5048b289f95131b", "testharness" ], + "svg/animations/seeking-events-1.html": [ + "8a93b45aa199f0581de07ab37cdd7ea34ebbf080", + "testharness" + ], + "svg/animations/seeking-events-2.html": [ + "4bfe05b84d82faf6b9f41a0db610aea23eaa09a5", + "testharness" + ], + "svg/animations/seeking-events-3.html": [ + "0a8530c212763e3665f424b31f91c7113b2bf3b1", + "testharness" + ], + "svg/animations/seeking-events-4.html": [ + "5877f0df3aaa292b5728cdbf53e0024ee35f235e", + "testharness" + ], + "svg/animations/seeking-events-5.html": [ + "8d660be615f71e79160246b0402d0783b6a2f1df", + "testharness" + ], + "svg/animations/seeking-events-6.html": [ + "05dfece67ac0dcc410a49adbd7337db61bc99bf3", + "testharness" + ], + "svg/animations/seeking-events-7.html": [ + "b3804f84cba026a37891f5b612959ef7e6c3ece7", + "testharness" + ], + "svg/animations/seeking-events-8.html": [ + "f679f2f06fbef77ce3875d054791d3f1051e2ca9", + "testharness" + ], "svg/animations/seeking-to-large-time.html": [ "2f89200cbbc688dc4de7a53f8087c8a40791d360", "testharness" @@ -736229,10 +768522,6 @@ "0e97a4a245a9ef01e1c65f159a9bd300a93b903f", "testharness" ], - "trusted-types/TrustedTypePolicy-CSP.tentative.html": [ - "3a56546151e4e8fcef6bfecafa42cd50dd01ebcc", - "testharness" - ], "trusted-types/TrustedTypePolicy-createXXX.tentative.html": [ "7e39042e1cb86c042367b5fc08e4e4e72c934165", "testharness" @@ -739798,7 +772087,7 @@ "support" ], "upgrade-insecure-requests/support/testharness-helper.sub.js": [ - "da20d2644b312d6225497081c67fa4b66f12b43a", + "c60015433b93d6e69686dccaa0aef0912eb44608", "support" ], "url/META.yml": [ @@ -740153,6 +772442,26 @@ "16fc2a9f8534c11d9fa3536c70724335b8c9ef1a", "manual" ], + "video-raf/META.yml": [ + "44c3187495dcb08e7cf8306875503e91fc6c448d", + "support" + ], + "video-raf/README.md": [ + "a5272939964a80cd7020c4bbbbe14dc4229afe61", + "support" + ], + "video-raf/video-request-animation-frame-parallel.html": [ + "35fe4575f3b543db990c956f9820e2eeee19745d", + "testharness" + ], + "video-raf/video-request-animation-frame-repeating.html": [ + "d98f39f96b1c3a5afacaa617f00f16f23d6b39fb", + "testharness" + ], + "video-raf/video-request-animation-frame.html": [ + "195f5edbe949e21824a76516b5668bc7361ba489", + "testharness" + ], "visual-viewport/META.yml": [ "5499f77335b0a2128f7395e73ee777f07a2346b4", "support" @@ -741754,7 +774063,7 @@ "testharness" ], "web-animations/interfaces/Animation/commitStyles.html": [ - "8d45cd65199c1a8f7b26ee1ead574e1ff0b26ac9", + "ca7d6410d0aa9cd02431cb6f8aab427f941e5cc7", "testharness" ], "web-animations/interfaces/Animation/constructor.html": [ @@ -741942,11 +774251,11 @@ "testharness" ], "web-animations/timing-model/animations/finishing-an-animation.html": [ - "b91eacfb689cac397be47a17909a7c1edf583824", + "5a41abd7b0844457eae367a873d10f544be574cc", "testharness" ], "web-animations/timing-model/animations/pausing-an-animation.html": [ - "bcec609d14206567ee25855f6dd7e684c69485ba", + "4884163c1d3a0fb795d3a34591ca5cb1d7a9eeda", "testharness" ], "web-animations/timing-model/animations/play-states.html": [ @@ -741954,7 +774263,7 @@ "testharness" ], "web-animations/timing-model/animations/playing-an-animation.html": [ - "1477261e6bc6227598b4e80475a66aa95fe5d15c", + "608e881e751bd49e3fa0cb292479459e9e04e522", "testharness" ], "web-animations/timing-model/animations/reverse-running-animation-ref.html": [ @@ -742909,6 +775218,18 @@ "4281f56379bb20f1e173c22c99ab208d2be0fdd4", "testharness" ], + "webaudio/the-audio-api/the-audioworklet-interface/process-getter.https.html": [ + "a4c59123a104600c148f620bb32c78f112fdd12a", + "testharness" + ], + "webaudio/the-audio-api/the-audioworklet-interface/process-parameters.https.html": [ + "4c6a10dfab3c29c0d3009e2a9650ad2d498c869a", + "testharness" + ], + "webaudio/the-audio-api/the-audioworklet-interface/processor-construction-port.https.html": [ + "6f1aa592250a3dc355ce792ce637ff67b32560a3", + "testharness" + ], "webaudio/the-audio-api/the-audioworklet-interface/processors/active-processing.js": [ "ef497733cafb471f74ace33045c4b4d43f3ce4f2", "support" @@ -742921,6 +775242,22 @@ "556459f46b3074f03578c53ba7b967387bab071b", "support" ], + "webaudio/the-audio-api/the-audioworklet-interface/processors/construction-port-new-after-new.js": [ + "d4c63f77755754e8e9c4cac2829452bd8d47232a", + "support" + ], + "webaudio/the-audio-api/the-audioworklet-interface/processors/construction-port-new-after-super.js": [ + "a6d4f0e2e8ef2988b10d3bfaddebdad80d6f540f", + "support" + ], + "webaudio/the-audio-api/the-audioworklet-interface/processors/construction-port-singleton.js": [ + "c40b5a7179aefe43d30439a017625460ee03ccff", + "support" + ], + "webaudio/the-audio-api/the-audioworklet-interface/processors/construction-port-super-after-new.js": [ + "e447830c5ffb442842bc1c6c6227dd8531d085e0", + "support" + ], "webaudio/the-audio-api/the-audioworklet-interface/processors/dummy-processor.js": [ "11155d508c51956ee07dcf4cf7c68829920c2af6", "support" @@ -742957,6 +775294,18 @@ "5a8baf03372d25b906948dcdd6c40990eeb860fa", "support" ], + "webaudio/the-audio-api/the-audioworklet-interface/processors/process-getter-test-instance-processor.js": [ + "b1434f54ba587fcb5daf9c0e95a011b725788904", + "support" + ], + "webaudio/the-audio-api/the-audioworklet-interface/processors/process-getter-test-prototype-processor.js": [ + "cef5fa8b52fa5cb2a04783b95a17d8f79d968644", + "support" + ], + "webaudio/the-audio-api/the-audioworklet-interface/processors/process-parameter-test-processor.js": [ + "a300d3cdec1af4268bd5ee7aeb0b3d4b68b193a3", + "support" + ], "webaudio/the-audio-api/the-audioworklet-interface/processors/sharedarraybuffer-processor.js": [ "2ccacccd4bb0a4d289ddccd9cafa4e29a0484730", "support" @@ -750666,7 +783015,7 @@ "testharness" ], "webxr/hit-test/ar_hittest_subscription_refSpaces.https.html": [ - "1f812d3a1f0a01c3c43de356d614e4d0fe254171", + "d1ce3154e6ce967f0ed8822e4b82dab6aead7dd3", "testharness" ], "webxr/hit-test/ar_hittest_subscription_states.https.html": [ @@ -750714,7 +783063,7 @@ "support" ], "webxr/resources/webxr_test_constants_fake_world.js": [ - "0601f54fce994d027ae17dc958cee6d746440c35", + "4e2adc633fd88bc13a4ab62bee86b4f3fbd19479", "support" ], "webxr/resources/webxr_util.js": [ @@ -751402,7 +783751,7 @@ "support" ], "workers/constructors/SharedWorker/1": [ - "c3f67beea90b061a828c4313db9710fa4126314f", + "831434e639908890a48c80c6793a51abb6ca8739", "support" ], "workers/constructors/SharedWorker/1.headers": [ @@ -751426,23 +783775,23 @@ "testharness" ], "workers/constructors/SharedWorker/URLMismatchError.htm": [ - "e1a11f4f8fe701365c89f9799794616975c39764", + "683d201ad3a0f7bbf8959d731ec20416c347909c", "testharness" ], "workers/constructors/SharedWorker/connect-event.html": [ - "a8dc71406716a2e0d061b8fe5407cd31af48e7e4", + "0ab41d25c906d85c3baa9436992dba52f1b157af", "testharness" ], "workers/constructors/SharedWorker/connect-event.js": [ - "c397152fe9ecabdad041466c00c01edb7e9bc7d7", + "2cf26a723e8efd9865628cb6a0d6c899ffa0fb14", "support" ], "workers/constructors/SharedWorker/dummy-name.html": [ - "59097c722e67d2cf326f90988bdf925c2c1c9827", + "25277042e21bbb0792d10cbc79d9669666051ef1", "testharness" ], "workers/constructors/SharedWorker/dummy-shared-worker.html": [ - "0c04f1f5fecd2ccbf4b14d9706d1725a9d1caf7c", + "59a449ad7d8758f5fde33070c99c24e611ab41fd", "testharness" ], "workers/constructors/SharedWorker/dummy-shared-worker.js": [ @@ -751450,7 +783799,7 @@ "support" ], "workers/constructors/SharedWorker/empty-name.html": [ - "c37f6b629b0ab8abc4a56815ef77f904419b89cb", + "94771d27c9eb5fd5c035a2275ae92e4751e07e76", "testharness" ], "workers/constructors/SharedWorker/empty.js": [ @@ -751458,39 +783807,39 @@ "support" ], "workers/constructors/SharedWorker/global-members.html": [ - "6860e68579b76473237332bf0c5842e278fc3f80", + "2da4fc1cee6ee2f14505df8609edb84d093c3490", "testharness" ], "workers/constructors/SharedWorker/global-members.js": [ - "47834479316348a3d8b41ad22688ed4d0cb05219", + "453da6aae514738b9c0cbb61f780c675b7f824f4", "support" ], "workers/constructors/SharedWorker/interface-objects.html": [ - "01949ddbf75a63bb1be105ea34a24f2a336a4892", + "6c2ef969a2002b8c92809b9d32e14729a3e4ad1f", "testharness" ], "workers/constructors/SharedWorker/interface-objects.js": [ - "15de7c9a545649b0edd10d3d94e3bc809ec28be4", + "2a7aaee687a4fb62c6ed952f8912178a0c1b893b", "support" ], "workers/constructors/SharedWorker/name.html": [ - "83b00725bccb6311716a3b509b361bd04bca68f3", + "4531cb1b800b092fcc974050f39c5a7e3b8be8f8", "testharness" ], "workers/constructors/SharedWorker/name.js": [ - "88b2684760215ad4dacd338eb4fff11aef4ca1fb", + "2bc2a4b18b5074bf5c08df725e29a3116dcbf6a6", "support" ], "workers/constructors/SharedWorker/no-arguments-ctor.html": [ - "c189e556019d8d761a43fbb6259368164ca7c19c", + "5a1231d7b5965edc554cbdad930793b00afa5ddf", "testharness" ], "workers/constructors/SharedWorker/null": [ - "5c38505b6c86594ad82fa87c701ba8e619299344", + "16f02d5131617553d0ff2c58d279b14a69b6eb81", "support" ], "workers/constructors/SharedWorker/null-arguments.html": [ - "c516eed21546c27bc36533a5dcaa8bbb5af893ea", + "dd5e5773edbb60a6e63c42eae6574dbebdf9d637", "testharness" ], "workers/constructors/SharedWorker/null.headers": [ @@ -751498,43 +783847,43 @@ "support" ], "workers/constructors/SharedWorker/number-arguments.html": [ - "1a4cfb2eacbada8d02d7729b5b90b149a2f94fae", + "8f90baa89854c9befb0f09cf651d0112f69c4047", "testharness" ], "workers/constructors/SharedWorker/port-onmessage.html": [ - "12784e9ba4021bf947cb62d64468f96c14c16e7b", + "706420c5e4a34e2efbce6dc2ffc88464c46fe7d0", "testharness" ], "workers/constructors/SharedWorker/port-onmessage.js": [ - "83d4579287aaafe9979b2e687ed6517d8aee584f", + "64ef84df15a3d0b1fec05b1b8cba9a39b0a655e8", "support" ], "workers/constructors/SharedWorker/port-properties.html": [ - "8f6f58a28104f98434f4f7643b4bc64f883e0c83", + "e2a1d5b2a8f43cbef429ff2f7f19b33800d557bf", "testharness" ], "workers/constructors/SharedWorker/port-readonly.html": [ - "181b3116f997affad3fd019a350961f18f13438b", + "cfb5f3afa514225411075243ffaea324526ecdae", "testharness" ], "workers/constructors/SharedWorker/same-origin.html": [ - "1fc76d5f5e46faceda09afcacce7c1b834834d44", + "0bfc503d06f0231a778735b6714f9ec2b7652e7e", "testharness" ], "workers/constructors/SharedWorker/setting-port-members.html": [ - "8c79ff295e536a8c01bd1866bdfdcc3515f2fcd9", + "367b756d33badf66ab096d40b56eb817cd01c81d", "testharness" ], "workers/constructors/SharedWorker/shared-worker.js": [ - "babebb1ce8ee727876483701845e20c8d1eb57b7", + "b6d18855da51021b8543343caadc7bee63b5dad8", "support" ], "workers/constructors/SharedWorker/undefined": [ - "3fe840d304285a8872d5b0c6dbf288ca4ec94642", + "b8462f19118b5f96a8e5f82ce4e729ab05f8d9cc", "support" ], "workers/constructors/SharedWorker/undefined-arguments.html": [ - "bc0a75bcfeb95a6a62627f66688ce52441dc956e", + "cd4c86e84ab15289fddc955349ba3f7a94c10826", "testharness" ], "workers/constructors/SharedWorker/undefined.headers": [ @@ -751542,15 +783891,15 @@ "support" ], "workers/constructors/SharedWorker/unexpected-global-properties.html": [ - "77a4f6304165eb929dbf72103a16ff5612ee168e", + "522d31ff56bf3a30c2db783f493bc383850b5fd8", "testharness" ], "workers/constructors/SharedWorker/unexpected-global-properties.js": [ - "d2cd94b4d90cec9f4eb17fe893ab44f3438a74ef", + "0af893582142c33140a4b6675a13f2964b9fbaea", "support" ], "workers/constructors/SharedWorker/unresolvable-url.html": [ - "c392d0e1f7dc2e846456b5ab32bd534cf9f7a012", + "c68968d77dd92411287dd547965bb799a3f61a6c", "testharness" ], "workers/constructors/Worker/1": [ diff --git a/tests/wpt/metadata/css/compositing/mix-blend-mode/mix-blend-mode-parent-element-overflow-scroll-blended-position-fixed.html.ini b/tests/wpt/metadata/css/compositing/mix-blend-mode/mix-blend-mode-parent-element-overflow-scroll-blended-position-fixed.html.ini deleted file mode 100644 index d4d72067d87..00000000000 --- a/tests/wpt/metadata/css/compositing/mix-blend-mode/mix-blend-mode-parent-element-overflow-scroll-blended-position-fixed.html.ini +++ /dev/null @@ -1,3 +0,0 @@ -[mix-blend-mode-parent-element-overflow-scroll-blended-position-fixed.html] - type: reftest - expected: FAIL diff --git a/tests/wpt/metadata/css/css-animations/Document-getAnimations.tentative.html.ini b/tests/wpt/metadata/css/css-animations/Document-getAnimations.tentative.html.ini index ce5858252e4..a2a02dff6dc 100644 --- a/tests/wpt/metadata/css/css-animations/Document-getAnimations.tentative.html.ini +++ b/tests/wpt/metadata/css/css-animations/Document-getAnimations.tentative.html.ini @@ -41,3 +41,6 @@ [Yet-to-start CSS Animations are returned] expected: FAIL + [Order of CSS Animations - within an element unaffected by start time] + expected: FAIL + diff --git a/tests/wpt/metadata/css/css-images/image-set/image-set-parsing.html.ini b/tests/wpt/metadata/css/css-images/image-set/image-set-parsing.html.ini new file mode 100644 index 00000000000..59dd0e35c1d --- /dev/null +++ b/tests/wpt/metadata/css/css-images/image-set/image-set-parsing.html.ini @@ -0,0 +1,34 @@ +[image-set-parsing.html] + [background-image: image-set(url(example.png) 1dpi) [ parsable \]] + expected: FAIL + + [background-image: image-set('example.jpeg' 222dpi, url(example.png) 3.5x) [ parsable \]] + expected: FAIL + + [content: image-set(url('example.png') 192dpi, linear-gradient(black, white) 1x) [ parsable \]] + expected: FAIL + + [background-image: image-set(url(example.png) 1dpcm, 'example.png' 2x) [ parsable \]] + expected: FAIL + + [background-image: image-set('example.jpg' 1x) [ parsable \]] + expected: FAIL + + [background-image: image-set(url(example.png) 1x) [ parsable \]] + expected: FAIL + + [background-image: image-set(linear-gradient(black, white) 1x) [ parsable \]] + expected: FAIL + + [content: image-set(linear-gradient(black, white) 1x, 'example.png' 4x) [ parsable \]] + expected: FAIL + + [background-image: image-set(url(example.png) 1x, 'example.png' 2x) [ parsable \]] + expected: FAIL + + [background-image: image-set(url(example.png) 1dppx) [ parsable \]] + expected: FAIL + + [background-image: image-set(url('example.png') 1x) [ parsable \]] + expected: FAIL + diff --git a/tests/wpt/metadata/css/cssom-view/elementFromPoint-001.html.ini b/tests/wpt/metadata/css/cssom-view/elementFromPoint-001.html.ini new file mode 100644 index 00000000000..e38782d8c85 --- /dev/null +++ b/tests/wpt/metadata/css/cssom-view/elementFromPoint-001.html.ini @@ -0,0 +1,4 @@ +[elementFromPoint-001.html] + [CSSOM View - 5 - extensions to the Document interface] + expected: FAIL + diff --git a/tests/wpt/metadata/custom-elements/reactions/HTMLMediaElement.html.ini b/tests/wpt/metadata/custom-elements/reactions/HTMLMediaElement.html.ini new file mode 100644 index 00000000000..4456e76a8d1 --- /dev/null +++ b/tests/wpt/metadata/custom-elements/reactions/HTMLMediaElement.html.ini @@ -0,0 +1,2 @@ +[HTMLMediaElement.html] + expected: CRASH diff --git a/tests/wpt/metadata/domparsing/DOMParser-parseFromString-encoding.html.ini b/tests/wpt/metadata/domparsing/DOMParser-parseFromString-encoding.html.ini new file mode 100644 index 00000000000..b648800ce61 --- /dev/null +++ b/tests/wpt/metadata/domparsing/DOMParser-parseFromString-encoding.html.ini @@ -0,0 +1,2 @@ +[DOMParser-parseFromString-encoding.html] + expected: PRECONDITION_FAILED diff --git a/tests/wpt/metadata/domparsing/DOMParser-parseFromString-html.html.ini b/tests/wpt/metadata/domparsing/DOMParser-parseFromString-html.html.ini new file mode 100644 index 00000000000..caf83492ea5 --- /dev/null +++ b/tests/wpt/metadata/domparsing/DOMParser-parseFromString-html.html.ini @@ -0,0 +1,4 @@ +[DOMParser-parseFromString-html.html] + [must be parsed with scripting disabled, so noscript works] + expected: FAIL + diff --git a/tests/wpt/metadata/domparsing/DOMParser-parseFromString-url-base-pushstate.html.ini b/tests/wpt/metadata/domparsing/DOMParser-parseFromString-url-base-pushstate.html.ini new file mode 100644 index 00000000000..d0d21c31128 --- /dev/null +++ b/tests/wpt/metadata/domparsing/DOMParser-parseFromString-url-base-pushstate.html.ini @@ -0,0 +1,31 @@ +[DOMParser-parseFromString-url-base-pushstate.html] + [image/svg+xml invalid XML: created using another iframe's DOMParser from this frame] + expected: FAIL + + [image/svg+xml valid: created using another iframe's DOMParser from this frame] + expected: FAIL + + [image/svg+xml invalid XML: created using another iframe's DOMParser from that frame] + expected: FAIL + + [image/svg+xml invalid XML: created normally] + expected: FAIL + + [image/svg+xml valid: created using a parser from the iframe and the method from this frame] + expected: FAIL + + [image/svg+xml invalid XML: created using a parser from the iframe and the method from this frame] + expected: FAIL + + [image/svg+xml valid: created normally] + expected: FAIL + + [image/svg+xml valid: created using a parser from this frame and the method from the iframe] + expected: FAIL + + [image/svg+xml invalid XML: created using a parser from this frame and the method from the iframe] + expected: FAIL + + [image/svg+xml valid: created using another iframe's DOMParser from that frame] + expected: FAIL + diff --git a/tests/wpt/metadata/domparsing/DOMParser-parseFromString-url-base.html.ini b/tests/wpt/metadata/domparsing/DOMParser-parseFromString-url-base.html.ini new file mode 100644 index 00000000000..b0a7140f246 --- /dev/null +++ b/tests/wpt/metadata/domparsing/DOMParser-parseFromString-url-base.html.ini @@ -0,0 +1,31 @@ +[DOMParser-parseFromString-url-base.html] + [image/svg+xml invalid XML: created using another iframe's DOMParser from this frame] + expected: FAIL + + [image/svg+xml valid: created using another iframe's DOMParser from this frame] + expected: FAIL + + [image/svg+xml invalid XML: created using another iframe's DOMParser from that frame] + expected: FAIL + + [image/svg+xml invalid XML: created normally] + expected: FAIL + + [image/svg+xml valid: created using a parser from the iframe and the method from this frame] + expected: FAIL + + [image/svg+xml invalid XML: created using a parser from the iframe and the method from this frame] + expected: FAIL + + [image/svg+xml valid: created normally] + expected: FAIL + + [image/svg+xml valid: created using a parser from this frame and the method from the iframe] + expected: FAIL + + [image/svg+xml invalid XML: created using a parser from this frame and the method from the iframe] + expected: FAIL + + [image/svg+xml valid: created using another iframe's DOMParser from that frame] + expected: FAIL + diff --git a/tests/wpt/metadata/domparsing/DOMParser-parseFromString-url-pushstate.html.ini b/tests/wpt/metadata/domparsing/DOMParser-parseFromString-url-pushstate.html.ini new file mode 100644 index 00000000000..21ae010ba60 --- /dev/null +++ b/tests/wpt/metadata/domparsing/DOMParser-parseFromString-url-pushstate.html.ini @@ -0,0 +1,31 @@ +[DOMParser-parseFromString-url-pushstate.html] + [image/svg+xml invalid XML: created using another iframe's DOMParser from this frame] + expected: FAIL + + [image/svg+xml valid: created using another iframe's DOMParser from this frame] + expected: FAIL + + [image/svg+xml invalid XML: created using another iframe's DOMParser from that frame] + expected: FAIL + + [image/svg+xml invalid XML: created normally] + expected: FAIL + + [image/svg+xml valid: created using a parser from the iframe and the method from this frame] + expected: FAIL + + [image/svg+xml invalid XML: created using a parser from the iframe and the method from this frame] + expected: FAIL + + [image/svg+xml valid: created normally] + expected: FAIL + + [image/svg+xml valid: created using a parser from this frame and the method from the iframe] + expected: FAIL + + [image/svg+xml invalid XML: created using a parser from this frame and the method from the iframe] + expected: FAIL + + [image/svg+xml valid: created using another iframe's DOMParser from that frame] + expected: FAIL + diff --git a/tests/wpt/metadata/domparsing/DOMParser-parseFromString-url.html.ini b/tests/wpt/metadata/domparsing/DOMParser-parseFromString-url.html.ini new file mode 100644 index 00000000000..dc0df3f1683 --- /dev/null +++ b/tests/wpt/metadata/domparsing/DOMParser-parseFromString-url.html.ini @@ -0,0 +1,31 @@ +[DOMParser-parseFromString-url.html] + [image/svg+xml invalid XML: created using another iframe's DOMParser from this frame] + expected: FAIL + + [image/svg+xml valid: created using another iframe's DOMParser from this frame] + expected: FAIL + + [image/svg+xml invalid XML: created using another iframe's DOMParser from that frame] + expected: FAIL + + [image/svg+xml invalid XML: created normally] + expected: FAIL + + [image/svg+xml valid: created using a parser from the iframe and the method from this frame] + expected: FAIL + + [image/svg+xml invalid XML: created using a parser from the iframe and the method from this frame] + expected: FAIL + + [image/svg+xml valid: created normally] + expected: FAIL + + [image/svg+xml valid: created using a parser from this frame and the method from the iframe] + expected: FAIL + + [image/svg+xml invalid XML: created using a parser from this frame and the method from the iframe] + expected: FAIL + + [image/svg+xml valid: created using another iframe's DOMParser from that frame] + expected: FAIL + diff --git a/tests/wpt/metadata/domparsing/DOMParser-parseFromString-xml-parsererror.html.ini b/tests/wpt/metadata/domparsing/DOMParser-parseFromString-xml-parsererror.html.ini index 7e9d58dfd9d..3ae47fecf41 100644 --- a/tests/wpt/metadata/domparsing/DOMParser-parseFromString-xml-parsererror.html.ini +++ b/tests/wpt/metadata/domparsing/DOMParser-parseFromString-xml-parsererror.html.ini @@ -50,3 +50,6 @@ [DOMParser: <parsererror> element added on error, 6</span>] expected: FAIL + [image/svg+xml is preserved in the error document] + expected: FAIL + diff --git a/tests/wpt/metadata/domparsing/DOMParser-parseFromString-xml.html.ini b/tests/wpt/metadata/domparsing/DOMParser-parseFromString-xml.html.ini index a3744b3b3ce..89aa9aaf120 100644 --- a/tests/wpt/metadata/domparsing/DOMParser-parseFromString-xml.html.ini +++ b/tests/wpt/metadata/domparsing/DOMParser-parseFromString-xml.html.ini @@ -21,3 +21,6 @@ [XMLDocument interface for incorrectly parsed document with type image/svg+xml] expected: FAIL + [scripting must be disabled with type image/svg+xml] + expected: FAIL + diff --git a/tests/wpt/metadata/fetch/content-type/response.window.js.ini b/tests/wpt/metadata/fetch/content-type/response.window.js.ini index bfabd206a43..953229f086c 100644 --- a/tests/wpt/metadata/fetch/content-type/response.window.js.ini +++ b/tests/wpt/metadata/fetch/content-type/response.window.js.ini @@ -312,9 +312,6 @@ [fetch(): separate response Content-Type: text/plain ] expected: NOTRUN - [<iframe>: separate response Content-Type: text/plain */*] - expected: FAIL - [<iframe>: combined response Content-Type: text/html;x=" text/plain] expected: FAIL @@ -324,12 +321,12 @@ [<iframe>: combined response Content-Type: */* text/html] expected: FAIL - [<iframe>: separate response Content-Type: text/html */*;charset=gbk] + [<iframe>: combined response Content-Type: text/html */*] expected: FAIL - [<iframe>: separate response Content-Type: text/html */*] + [<iframe>: combined response Content-Type: text/html */*;charset=gbk] expected: FAIL - [<iframe>: separate response Content-Type: text/html;" \\" text/plain] + [<iframe>: combined response Content-Type: text/html;" \\" text/plain] expected: FAIL diff --git a/tests/wpt/metadata/fetch/nosniff/parsing-nosniff.window.js.ini b/tests/wpt/metadata/fetch/nosniff/parsing-nosniff.window.js.ini index 536384f36e1..a63e414f43a 100644 --- a/tests/wpt/metadata/fetch/nosniff/parsing-nosniff.window.js.ini +++ b/tests/wpt/metadata/fetch/nosniff/parsing-nosniff.window.js.ini @@ -11,6 +11,6 @@ [X-Content-Type-Options%3A%20nosniff%0C] expected: FAIL - [X-Content-Type-Options%3A%20%2Cnosniff] + [X-Content-Type-Options%3A%20%40%23%24%23%25%25%26%5E%26%5E*()()11!%2Cnosniff] expected: FAIL diff --git a/tests/wpt/metadata/fetch/security/embedded-credentials.tentative.sub.html.ini b/tests/wpt/metadata/fetch/security/embedded-credentials.tentative.sub.html.ini index 80ebd73cb00..0cb858e8b2e 100644 --- a/tests/wpt/metadata/fetch/security/embedded-credentials.tentative.sub.html.ini +++ b/tests/wpt/metadata/fetch/security/embedded-credentials.tentative.sub.html.ini @@ -8,14 +8,11 @@ expected: FAIL [Embedded credentials are treated as network errors in new windows.] - expected: TIMEOUT + expected: FAIL [Embedded credentials matching the top-level are treated as network errors for cross-origin URLs.] expected: TIMEOUT - [Embedded credentials matching the top-level are not treated as network errors for same-origin URLs.] - expected: TIMEOUT - [Embedded credentials matching the top-level are not treated as network errors for relative URLs.] expected: TIMEOUT diff --git a/tests/wpt/metadata/html/browsers/history/the-history-interface/traverse_the_history_5.html.ini b/tests/wpt/metadata/html/browsers/history/the-history-interface/traverse_the_history_5.html.ini new file mode 100644 index 00000000000..dc2e45516de --- /dev/null +++ b/tests/wpt/metadata/html/browsers/history/the-history-interface/traverse_the_history_5.html.ini @@ -0,0 +1,4 @@ +[traverse_the_history_5.html] + [Multiple history traversals, last would be aborted] + expected: FAIL + diff --git a/tests/wpt/metadata/html/semantics/embedded-content/the-iframe-element/iframe_sandbox_popups_escaping-3.html.ini b/tests/wpt/metadata/html/semantics/embedded-content/the-iframe-element/iframe_sandbox_popups_escaping-3.html.ini index 5f60c78e73c..f6a7aca3306 100644 --- a/tests/wpt/metadata/html/semantics/embedded-content/the-iframe-element/iframe_sandbox_popups_escaping-3.html.ini +++ b/tests/wpt/metadata/html/semantics/embedded-content/the-iframe-element/iframe_sandbox_popups_escaping-3.html.ini @@ -1,6 +1,5 @@ [iframe_sandbox_popups_escaping-3.html] type: testharness - expected: TIMEOUT [Check that popups from a sandboxed iframe escape the sandbox if\n allow-popups-to-escape-sandbox is used] - expected: TIMEOUT + expected: FAIL diff --git a/tests/wpt/metadata/html/semantics/embedded-content/the-iframe-element/iframe_sandbox_popups_nonescaping-1.html.ini b/tests/wpt/metadata/html/semantics/embedded-content/the-iframe-element/iframe_sandbox_popups_nonescaping-1.html.ini index 3f7e3e9544f..9df1ac56f2a 100644 --- a/tests/wpt/metadata/html/semantics/embedded-content/the-iframe-element/iframe_sandbox_popups_nonescaping-1.html.ini +++ b/tests/wpt/metadata/html/semantics/embedded-content/the-iframe-element/iframe_sandbox_popups_nonescaping-1.html.ini @@ -1,5 +1,6 @@ [iframe_sandbox_popups_nonescaping-1.html] type: testharness + expected: TIMEOUT [Check that popups from a sandboxed iframe do not escape the sandbox] - expected: FAIL + expected: NOTRUN diff --git a/tests/wpt/metadata/html/semantics/forms/form-submission-0/form-double-submit-3.html.ini b/tests/wpt/metadata/html/semantics/forms/form-submission-0/form-double-submit-3.html.ini index 941d0dee0c8..df89cd21511 100644 --- a/tests/wpt/metadata/html/semantics/forms/form-submission-0/form-double-submit-3.html.ini +++ b/tests/wpt/metadata/html/semantics/forms/form-submission-0/form-double-submit-3.html.ini @@ -1,5 +1,5 @@ [form-double-submit-3.html] expected: ERROR [<button> should have the same double-submit protection as <input type=submit>] - expected: TIMEOUT + expected: FAIL diff --git a/tests/wpt/metadata/html/semantics/scripting-1/the-script-element/module/errorhandling.html.ini b/tests/wpt/metadata/html/semantics/scripting-1/the-script-element/module/errorhandling.html.ini deleted file mode 100644 index 8472b06a926..00000000000 --- a/tests/wpt/metadata/html/semantics/scripting-1/the-script-element/module/errorhandling.html.ini +++ /dev/null @@ -1,2 +0,0 @@ -[errorhandling.html] - expected: CRASH diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..8e1467fd5dc --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for a-tag to cross-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..820fbb8b9a0 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for a-tag to cross-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..f98dab23238 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..5632f78d691 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-https.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for a-tag to same-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..c9f7c2fb60d --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..61d6744ced9 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..dc1bdf34daa --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..0aee26bf829 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..c9ab629d57b --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..053ac616f7c --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..2c6850e5fa3 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..2ecc2991bbd --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..f0751aa19da --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..53c9bd753f9 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..c510847fb55 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-https.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..f04ba7626e7 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..e573ebdacfe --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..2f88fc74db1 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..5786a158425 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..3eab15bf597 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..45e22877ec5 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..dc21784d553 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..e96f3886ac5 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..6561c0d884b --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..fbddf04c0ab --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..b1230ba6b6c --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..74dabecc45e --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-https.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..5cadfec54d8 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..20ab9e1af17 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..f322f695f8a --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..38398373b2f --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..d80f88fc6bf --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..030b0ca9bb2 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..95284119022 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..35ef0f39fd2 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..f78cf5bf0ec --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer/sharedworker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer/sharedworker-classic/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..1769b2580b4 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer/sharedworker-classic/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects omitted for sharedworker-classic to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer/sharedworker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer/sharedworker-classic/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..e529a4801cd --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer/sharedworker-classic/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects omitted for sharedworker-classic to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer/sharedworker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer/sharedworker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..dea778a0734 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer/sharedworker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects omitted for sharedworker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer/sharedworker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer/sharedworker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..16ba8fe670e --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/no-referrer/sharedworker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects omitted for sharedworker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..44a2d7f60d4 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.no-redirect.http.html] + [Referrer Policy: Expects origin for a-tag to cross-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..e6440352801 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.no-redirect.http.html] + [Referrer Policy: Expects origin for a-tag to cross-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..f98dab23238 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/a-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/a-tag/same-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..c3bdc1c7b55 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/a-tag/same-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-https.no-redirect.http.html] + [Referrer Policy: Expects origin for a-tag to same-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..0d9c9ff0afa --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.keep-origin.http.html] + [Referrer Policy: Expects origin for fetch to cross-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..3d593d8b0b9 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.no-redirect.http.html] + [Referrer Policy: Expects origin for fetch to cross-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..79eae6e3b9d --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.swap-origin.http.html] + [Referrer Policy: Expects origin for fetch to cross-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..2911a9e60a5 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.keep-origin.http.html] + [Referrer Policy: Expects origin for fetch to cross-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..5ea4a082de3 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.no-redirect.http.html] + [Referrer Policy: Expects origin for fetch to cross-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..280a8921247 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.swap-origin.http.html] + [Referrer Policy: Expects origin for fetch to cross-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..2c6850e5fa3 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..2ecc2991bbd --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..9abdc225d4a --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.swap-origin.http.html] + [Referrer Policy: Expects origin for fetch to same-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..d204df6ff1e --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.keep-origin.http.html] + [Referrer Policy: Expects origin for fetch to same-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..837ba368f4d --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-https.no-redirect.http.html] + [Referrer Policy: Expects origin for fetch to same-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..0c4227c0aff --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.swap-origin.http.html] + [Referrer Policy: Expects origin for fetch to same-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..358acfa9e3d --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.keep-origin.http.html] + [Referrer Policy: Expects origin for img-tag to cross-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..88098c53a70 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.no-redirect.http.html] + [Referrer Policy: Expects origin for img-tag to cross-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..fdc78287b2f --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.swap-origin.http.html] + [Referrer Policy: Expects origin for img-tag to cross-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..1ef2b4acd86 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.keep-origin.http.html] + [Referrer Policy: Expects origin for img-tag to cross-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..f8a94a488bd --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.no-redirect.http.html] + [Referrer Policy: Expects origin for img-tag to cross-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..b5f9a3e23c4 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.swap-origin.http.html] + [Referrer Policy: Expects origin for img-tag to cross-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..e96f3886ac5 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..6561c0d884b --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..dc161000188 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.swap-origin.http.html] + [Referrer Policy: Expects origin for img-tag to same-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..99de401fdb1 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.keep-origin.http.html] + [Referrer Policy: Expects origin for img-tag to same-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..5ac598c79b4 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-https.no-redirect.http.html] + [Referrer Policy: Expects origin for img-tag to same-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..f82362f5401 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.swap-origin.http.html] + [Referrer Policy: Expects origin for img-tag to same-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..20ab9e1af17 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..f322f695f8a --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..38398373b2f --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..d80f88fc6bf --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..030b0ca9bb2 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..95284119022 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..35ef0f39fd2 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..f78cf5bf0ec --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/a-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/a-tag/cross-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..44a2d7f60d4 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/a-tag/cross-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.no-redirect.http.html] + [Referrer Policy: Expects origin for a-tag to cross-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/a-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/a-tag/cross-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..e6440352801 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/a-tag/cross-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.no-redirect.http.html] + [Referrer Policy: Expects origin for a-tag to cross-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/a-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/a-tag/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..b406f5fa517 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/a-tag/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects origin for a-tag to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/a-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/a-tag/same-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..c3bdc1c7b55 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/a-tag/same-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-https.no-redirect.http.html] + [Referrer Policy: Expects origin for a-tag to same-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/fetch/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/fetch/cross-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..0d9c9ff0afa --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/fetch/cross-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.keep-origin.http.html] + [Referrer Policy: Expects origin for fetch to cross-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/fetch/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/fetch/cross-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..3d593d8b0b9 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/fetch/cross-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.no-redirect.http.html] + [Referrer Policy: Expects origin for fetch to cross-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/fetch/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/fetch/cross-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..79eae6e3b9d --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/fetch/cross-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.swap-origin.http.html] + [Referrer Policy: Expects origin for fetch to cross-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/fetch/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/fetch/cross-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..2911a9e60a5 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/fetch/cross-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.keep-origin.http.html] + [Referrer Policy: Expects origin for fetch to cross-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/fetch/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/fetch/cross-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..5ea4a082de3 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/fetch/cross-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.no-redirect.http.html] + [Referrer Policy: Expects origin for fetch to cross-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/fetch/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/fetch/cross-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..280a8921247 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/fetch/cross-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.swap-origin.http.html] + [Referrer Policy: Expects origin for fetch to cross-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/fetch/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/fetch/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..e821f119755 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/fetch/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects origin for fetch to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/fetch/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/fetch/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..d52522e6f1b --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/fetch/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects origin for fetch to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/fetch/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/fetch/same-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..9abdc225d4a --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/fetch/same-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.swap-origin.http.html] + [Referrer Policy: Expects origin for fetch to same-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/fetch/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/fetch/same-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..d204df6ff1e --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/fetch/same-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.keep-origin.http.html] + [Referrer Policy: Expects origin for fetch to same-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/fetch/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/fetch/same-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..837ba368f4d --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/fetch/same-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-https.no-redirect.http.html] + [Referrer Policy: Expects origin for fetch to same-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/fetch/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/fetch/same-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..0c4227c0aff --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/fetch/same-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.swap-origin.http.html] + [Referrer Policy: Expects origin for fetch to same-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..358acfa9e3d --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.keep-origin.http.html] + [Referrer Policy: Expects origin for img-tag to cross-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..88098c53a70 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.no-redirect.http.html] + [Referrer Policy: Expects origin for img-tag to cross-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..fdc78287b2f --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.swap-origin.http.html] + [Referrer Policy: Expects origin for img-tag to cross-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..1ef2b4acd86 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.keep-origin.http.html] + [Referrer Policy: Expects origin for img-tag to cross-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..f8a94a488bd --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.no-redirect.http.html] + [Referrer Policy: Expects origin for img-tag to cross-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..b5f9a3e23c4 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.swap-origin.http.html] + [Referrer Policy: Expects origin for img-tag to cross-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/img-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/img-tag/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..a51b9ca809f --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/img-tag/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects origin for img-tag to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/img-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/img-tag/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..120396a21dc --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/img-tag/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects origin for img-tag to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/img-tag/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/img-tag/same-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..dc161000188 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/img-tag/same-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.swap-origin.http.html] + [Referrer Policy: Expects origin for img-tag to same-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/img-tag/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/img-tag/same-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..99de401fdb1 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/img-tag/same-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.keep-origin.http.html] + [Referrer Policy: Expects origin for img-tag to same-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/img-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/img-tag/same-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..5ac598c79b4 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/img-tag/same-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-https.no-redirect.http.html] + [Referrer Policy: Expects origin for img-tag to same-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/img-tag/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/img-tag/same-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..f82362f5401 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/img-tag/same-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.swap-origin.http.html] + [Referrer Policy: Expects origin for img-tag to same-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/sharedworker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/sharedworker-classic/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..10ed4751d38 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/sharedworker-classic/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects origin for sharedworker-classic to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/sharedworker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/sharedworker-classic/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..3f3d2028ec1 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/sharedworker-classic/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects origin for sharedworker-classic to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/sharedworker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/sharedworker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..7a2cad3c568 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/sharedworker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects origin for sharedworker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/sharedworker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/sharedworker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..662d2d3d61d --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/sharedworker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects origin for sharedworker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/worker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/worker-classic/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..db5928d7021 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/worker-classic/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects origin for worker-classic to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/worker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/worker-classic/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..b53b10f4a28 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/worker-classic/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects origin for worker-classic to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/worker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/worker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..c332d93674e --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/worker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects origin for worker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/worker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/worker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..e56c7152d59 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/origin/worker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects origin for worker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/same-origin/a-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/same-origin/a-tag/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..f98dab23238 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/same-origin/a-tag/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/same-origin/fetch/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/same-origin/fetch/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..2c6850e5fa3 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/same-origin/fetch/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/same-origin/fetch/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/same-origin/fetch/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..2ecc2991bbd --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/same-origin/fetch/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/same-origin/img-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/same-origin/img-tag/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..e96f3886ac5 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/same-origin/img-tag/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/same-origin/img-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/same-origin/img-tag/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..6561c0d884b --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/same-origin/img-tag/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..20ab9e1af17 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..f322f695f8a --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/same-origin/sharedworker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/same-origin/sharedworker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..38398373b2f --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/same-origin/sharedworker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/same-origin/sharedworker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/same-origin/sharedworker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..d80f88fc6bf --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/same-origin/sharedworker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..030b0ca9bb2 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..95284119022 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/same-origin/worker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/same-origin/worker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..35ef0f39fd2 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/same-origin/worker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/same-origin/worker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/same-origin/worker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..f78cf5bf0ec --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/same-origin/worker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..44a2d7f60d4 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.no-redirect.http.html] + [Referrer Policy: Expects origin for a-tag to cross-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..e6440352801 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.no-redirect.http.html] + [Referrer Policy: Expects origin for a-tag to cross-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..f98dab23238 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/a-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/a-tag/same-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..c3bdc1c7b55 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/a-tag/same-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-https.no-redirect.http.html] + [Referrer Policy: Expects origin for a-tag to same-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..0d9c9ff0afa --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.keep-origin.http.html] + [Referrer Policy: Expects origin for fetch to cross-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..3d593d8b0b9 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.no-redirect.http.html] + [Referrer Policy: Expects origin for fetch to cross-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..79eae6e3b9d --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.swap-origin.http.html] + [Referrer Policy: Expects origin for fetch to cross-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..2911a9e60a5 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.keep-origin.http.html] + [Referrer Policy: Expects origin for fetch to cross-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..5ea4a082de3 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.no-redirect.http.html] + [Referrer Policy: Expects origin for fetch to cross-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..280a8921247 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.swap-origin.http.html] + [Referrer Policy: Expects origin for fetch to cross-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..2c6850e5fa3 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..2ecc2991bbd --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..9abdc225d4a --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.swap-origin.http.html] + [Referrer Policy: Expects origin for fetch to same-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..d204df6ff1e --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.keep-origin.http.html] + [Referrer Policy: Expects origin for fetch to same-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..837ba368f4d --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-https.no-redirect.http.html] + [Referrer Policy: Expects origin for fetch to same-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..0c4227c0aff --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.swap-origin.http.html] + [Referrer Policy: Expects origin for fetch to same-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..358acfa9e3d --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.keep-origin.http.html] + [Referrer Policy: Expects origin for img-tag to cross-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..88098c53a70 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.no-redirect.http.html] + [Referrer Policy: Expects origin for img-tag to cross-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..fdc78287b2f --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.swap-origin.http.html] + [Referrer Policy: Expects origin for img-tag to cross-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..1ef2b4acd86 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.keep-origin.http.html] + [Referrer Policy: Expects origin for img-tag to cross-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..f8a94a488bd --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.no-redirect.http.html] + [Referrer Policy: Expects origin for img-tag to cross-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..b5f9a3e23c4 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.swap-origin.http.html] + [Referrer Policy: Expects origin for img-tag to cross-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..e96f3886ac5 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..6561c0d884b --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..dc161000188 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.swap-origin.http.html] + [Referrer Policy: Expects origin for img-tag to same-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..99de401fdb1 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.keep-origin.http.html] + [Referrer Policy: Expects origin for img-tag to same-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..5ac598c79b4 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-https.no-redirect.http.html] + [Referrer Policy: Expects origin for img-tag to same-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..f82362f5401 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.swap-origin.http.html] + [Referrer Policy: Expects origin for img-tag to same-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..20ab9e1af17 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..f322f695f8a --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..38398373b2f --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..d80f88fc6bf --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..030b0ca9bb2 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..95284119022 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..35ef0f39fd2 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..f78cf5bf0ec --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/a-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/a-tag/cross-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..44a2d7f60d4 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/a-tag/cross-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.no-redirect.http.html] + [Referrer Policy: Expects origin for a-tag to cross-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/a-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/a-tag/cross-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..e6440352801 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/a-tag/cross-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.no-redirect.http.html] + [Referrer Policy: Expects origin for a-tag to cross-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/a-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/a-tag/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..b406f5fa517 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/a-tag/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects origin for a-tag to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/a-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/a-tag/same-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..c3bdc1c7b55 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/a-tag/same-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-https.no-redirect.http.html] + [Referrer Policy: Expects origin for a-tag to same-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..0d9c9ff0afa --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.keep-origin.http.html] + [Referrer Policy: Expects origin for fetch to cross-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..3d593d8b0b9 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.no-redirect.http.html] + [Referrer Policy: Expects origin for fetch to cross-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..79eae6e3b9d --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.swap-origin.http.html] + [Referrer Policy: Expects origin for fetch to cross-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..2911a9e60a5 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.keep-origin.http.html] + [Referrer Policy: Expects origin for fetch to cross-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..5ea4a082de3 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.no-redirect.http.html] + [Referrer Policy: Expects origin for fetch to cross-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..280a8921247 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.swap-origin.http.html] + [Referrer Policy: Expects origin for fetch to cross-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..e821f119755 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects origin for fetch to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..d52522e6f1b --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects origin for fetch to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..9abdc225d4a --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.swap-origin.http.html] + [Referrer Policy: Expects origin for fetch to same-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..d204df6ff1e --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.keep-origin.http.html] + [Referrer Policy: Expects origin for fetch to same-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..837ba368f4d --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-https.no-redirect.http.html] + [Referrer Policy: Expects origin for fetch to same-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..0c4227c0aff --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.swap-origin.http.html] + [Referrer Policy: Expects origin for fetch to same-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..358acfa9e3d --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.keep-origin.http.html] + [Referrer Policy: Expects origin for img-tag to cross-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..88098c53a70 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.no-redirect.http.html] + [Referrer Policy: Expects origin for img-tag to cross-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..fdc78287b2f --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.swap-origin.http.html] + [Referrer Policy: Expects origin for img-tag to cross-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..1ef2b4acd86 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.keep-origin.http.html] + [Referrer Policy: Expects origin for img-tag to cross-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..f8a94a488bd --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.no-redirect.http.html] + [Referrer Policy: Expects origin for img-tag to cross-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..b5f9a3e23c4 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.swap-origin.http.html] + [Referrer Policy: Expects origin for img-tag to cross-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..a51b9ca809f --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects origin for img-tag to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..120396a21dc --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects origin for img-tag to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..dc161000188 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.swap-origin.http.html] + [Referrer Policy: Expects origin for img-tag to same-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..99de401fdb1 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.keep-origin.http.html] + [Referrer Policy: Expects origin for img-tag to same-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..5ac598c79b4 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-https.no-redirect.http.html] + [Referrer Policy: Expects origin for img-tag to same-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..f82362f5401 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.swap-origin.http.html] + [Referrer Policy: Expects origin for img-tag to same-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/sharedworker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/sharedworker-classic/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..10ed4751d38 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/sharedworker-classic/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects origin for sharedworker-classic to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/sharedworker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/sharedworker-classic/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..3f3d2028ec1 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/sharedworker-classic/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects origin for sharedworker-classic to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/sharedworker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/sharedworker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..7a2cad3c568 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/sharedworker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects origin for sharedworker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/sharedworker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/sharedworker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..662d2d3d61d --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/sharedworker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects origin for sharedworker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/worker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/worker-classic/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..db5928d7021 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/worker-classic/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects origin for worker-classic to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/worker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/worker-classic/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..b53b10f4a28 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/worker-classic/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects origin for worker-classic to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/worker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/worker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..c332d93674e --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/worker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects origin for worker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/worker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/worker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..e56c7152d59 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/strict-origin/worker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects origin for worker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..8e1467fd5dc --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for a-tag to cross-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..820fbb8b9a0 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for a-tag to cross-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..f98dab23238 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..5632f78d691 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-https.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for a-tag to same-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..c9f7c2fb60d --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..61d6744ced9 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..dc1bdf34daa --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..0aee26bf829 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..c9ab629d57b --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..053ac616f7c --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..2c6850e5fa3 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..2ecc2991bbd --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..f0751aa19da --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..53c9bd753f9 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..c510847fb55 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-https.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..f04ba7626e7 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..e573ebdacfe --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..2f88fc74db1 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..5786a158425 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..3eab15bf597 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..45e22877ec5 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..dc21784d553 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..e96f3886ac5 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..6561c0d884b --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..fbddf04c0ab --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..b1230ba6b6c --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..74dabecc45e --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-https.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..5cadfec54d8 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..20ab9e1af17 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..f322f695f8a --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/sharedworker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/sharedworker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..38398373b2f --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/sharedworker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/sharedworker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/sharedworker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..d80f88fc6bf --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/sharedworker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..030b0ca9bb2 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..95284119022 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..35ef0f39fd2 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..f78cf5bf0ec --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/a-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/a-tag/cross-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..8e1467fd5dc --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/a-tag/cross-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for a-tag to cross-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/a-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/a-tag/cross-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..820fbb8b9a0 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/a-tag/cross-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for a-tag to cross-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/a-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/a-tag/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..f98dab23238 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/a-tag/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/a-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/a-tag/same-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..5632f78d691 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/a-tag/same-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-https.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for a-tag to same-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/fetch/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/fetch/cross-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..c9f7c2fb60d --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/fetch/cross-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/fetch/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/fetch/cross-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..61d6744ced9 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/fetch/cross-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/fetch/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/fetch/cross-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..dc1bdf34daa --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/fetch/cross-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/fetch/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/fetch/cross-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..0aee26bf829 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/fetch/cross-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/fetch/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/fetch/cross-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..c9ab629d57b --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/fetch/cross-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/fetch/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/fetch/cross-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..053ac616f7c --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/fetch/cross-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/fetch/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/fetch/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..2c6850e5fa3 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/fetch/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/fetch/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/fetch/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..2ecc2991bbd --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/fetch/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/fetch/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/fetch/same-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..f0751aa19da --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/fetch/same-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/fetch/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/fetch/same-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..53c9bd753f9 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/fetch/same-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/fetch/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/fetch/same-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..c510847fb55 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/fetch/same-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-https.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/fetch/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/fetch/same-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..f04ba7626e7 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/fetch/same-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..e573ebdacfe --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..2f88fc74db1 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..5786a158425 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..3eab15bf597 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..45e22877ec5 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..dc21784d553 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/img-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/img-tag/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..e96f3886ac5 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/img-tag/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/img-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/img-tag/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..6561c0d884b --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/img-tag/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/img-tag/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/img-tag/same-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..fbddf04c0ab --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/img-tag/same-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/img-tag/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/img-tag/same-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..b1230ba6b6c --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/img-tag/same-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/img-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/img-tag/same-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..74dabecc45e --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/img-tag/same-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-https.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/img-tag/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/img-tag/same-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..5cadfec54d8 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/img-tag/same-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..20ab9e1af17 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..f322f695f8a --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/sharedworker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/sharedworker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..38398373b2f --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/sharedworker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/sharedworker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/sharedworker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..d80f88fc6bf --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/sharedworker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/worker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/worker-classic/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..030b0ca9bb2 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/worker-classic/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/worker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/worker-classic/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..95284119022 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/worker-classic/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/worker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/worker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..35ef0f39fd2 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/worker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/worker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/worker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..f78cf5bf0ec --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.http-rp/unset/worker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..8e1467fd5dc --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for a-tag to cross-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..820fbb8b9a0 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for a-tag to cross-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..f98dab23238 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..5632f78d691 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-https.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for a-tag to same-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..c9f7c2fb60d --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..61d6744ced9 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..dc1bdf34daa --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..0aee26bf829 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..c9ab629d57b --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..053ac616f7c --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..2c6850e5fa3 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..2ecc2991bbd --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..f0751aa19da --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..53c9bd753f9 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..c510847fb55 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-https.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..f04ba7626e7 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..e573ebdacfe --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..2f88fc74db1 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..5786a158425 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..3eab15bf597 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..45e22877ec5 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..dc21784d553 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..e96f3886ac5 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..6561c0d884b --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..fbddf04c0ab --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..b1230ba6b6c --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..74dabecc45e --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-https.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..5cadfec54d8 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..20ab9e1af17 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..f322f695f8a --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..38398373b2f --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..d80f88fc6bf --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..030b0ca9bb2 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..95284119022 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..35ef0f39fd2 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..f78cf5bf0ec --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer/sharedworker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer/sharedworker-classic/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..1769b2580b4 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer/sharedworker-classic/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects omitted for sharedworker-classic to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer/sharedworker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer/sharedworker-classic/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..e529a4801cd --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer/sharedworker-classic/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects omitted for sharedworker-classic to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer/sharedworker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer/sharedworker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..dea778a0734 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer/sharedworker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects omitted for sharedworker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer/sharedworker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer/sharedworker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..16ba8fe670e --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/no-referrer/sharedworker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects omitted for sharedworker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..44a2d7f60d4 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.no-redirect.http.html] + [Referrer Policy: Expects origin for a-tag to cross-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..e6440352801 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.no-redirect.http.html] + [Referrer Policy: Expects origin for a-tag to cross-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..f98dab23238 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/a-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/a-tag/same-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..c3bdc1c7b55 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/a-tag/same-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-https.no-redirect.http.html] + [Referrer Policy: Expects origin for a-tag to same-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..0d9c9ff0afa --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.keep-origin.http.html] + [Referrer Policy: Expects origin for fetch to cross-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..3d593d8b0b9 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.no-redirect.http.html] + [Referrer Policy: Expects origin for fetch to cross-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..79eae6e3b9d --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.swap-origin.http.html] + [Referrer Policy: Expects origin for fetch to cross-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..2911a9e60a5 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.keep-origin.http.html] + [Referrer Policy: Expects origin for fetch to cross-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..5ea4a082de3 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.no-redirect.http.html] + [Referrer Policy: Expects origin for fetch to cross-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..280a8921247 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.swap-origin.http.html] + [Referrer Policy: Expects origin for fetch to cross-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..2c6850e5fa3 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..2ecc2991bbd --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..9abdc225d4a --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.swap-origin.http.html] + [Referrer Policy: Expects origin for fetch to same-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..d204df6ff1e --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.keep-origin.http.html] + [Referrer Policy: Expects origin for fetch to same-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..837ba368f4d --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-https.no-redirect.http.html] + [Referrer Policy: Expects origin for fetch to same-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..0c4227c0aff --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.swap-origin.http.html] + [Referrer Policy: Expects origin for fetch to same-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..358acfa9e3d --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.keep-origin.http.html] + [Referrer Policy: Expects origin for img-tag to cross-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..88098c53a70 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.no-redirect.http.html] + [Referrer Policy: Expects origin for img-tag to cross-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..fdc78287b2f --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.swap-origin.http.html] + [Referrer Policy: Expects origin for img-tag to cross-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..1ef2b4acd86 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.keep-origin.http.html] + [Referrer Policy: Expects origin for img-tag to cross-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..f8a94a488bd --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.no-redirect.http.html] + [Referrer Policy: Expects origin for img-tag to cross-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..b5f9a3e23c4 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.swap-origin.http.html] + [Referrer Policy: Expects origin for img-tag to cross-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..e96f3886ac5 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..6561c0d884b --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..dc161000188 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.swap-origin.http.html] + [Referrer Policy: Expects origin for img-tag to same-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..99de401fdb1 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.keep-origin.http.html] + [Referrer Policy: Expects origin for img-tag to same-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..5ac598c79b4 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-https.no-redirect.http.html] + [Referrer Policy: Expects origin for img-tag to same-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..f82362f5401 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.swap-origin.http.html] + [Referrer Policy: Expects origin for img-tag to same-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..20ab9e1af17 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..f322f695f8a --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..38398373b2f --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..d80f88fc6bf --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..030b0ca9bb2 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..95284119022 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..35ef0f39fd2 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..f78cf5bf0ec --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/a-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/a-tag/cross-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..44a2d7f60d4 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/a-tag/cross-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.no-redirect.http.html] + [Referrer Policy: Expects origin for a-tag to cross-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/a-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/a-tag/cross-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..e6440352801 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/a-tag/cross-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.no-redirect.http.html] + [Referrer Policy: Expects origin for a-tag to cross-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/a-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/a-tag/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..b406f5fa517 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/a-tag/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects origin for a-tag to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/a-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/a-tag/same-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..c3bdc1c7b55 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/a-tag/same-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-https.no-redirect.http.html] + [Referrer Policy: Expects origin for a-tag to same-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/fetch/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/fetch/cross-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..0d9c9ff0afa --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/fetch/cross-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.keep-origin.http.html] + [Referrer Policy: Expects origin for fetch to cross-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/fetch/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/fetch/cross-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..3d593d8b0b9 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/fetch/cross-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.no-redirect.http.html] + [Referrer Policy: Expects origin for fetch to cross-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/fetch/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/fetch/cross-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..79eae6e3b9d --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/fetch/cross-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.swap-origin.http.html] + [Referrer Policy: Expects origin for fetch to cross-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/fetch/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/fetch/cross-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..2911a9e60a5 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/fetch/cross-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.keep-origin.http.html] + [Referrer Policy: Expects origin for fetch to cross-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/fetch/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/fetch/cross-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..5ea4a082de3 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/fetch/cross-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.no-redirect.http.html] + [Referrer Policy: Expects origin for fetch to cross-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/fetch/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/fetch/cross-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..280a8921247 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/fetch/cross-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.swap-origin.http.html] + [Referrer Policy: Expects origin for fetch to cross-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/fetch/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/fetch/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..e821f119755 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/fetch/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects origin for fetch to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/fetch/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/fetch/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..d52522e6f1b --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/fetch/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects origin for fetch to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/fetch/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/fetch/same-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..9abdc225d4a --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/fetch/same-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.swap-origin.http.html] + [Referrer Policy: Expects origin for fetch to same-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/fetch/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/fetch/same-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..d204df6ff1e --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/fetch/same-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.keep-origin.http.html] + [Referrer Policy: Expects origin for fetch to same-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/fetch/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/fetch/same-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..837ba368f4d --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/fetch/same-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-https.no-redirect.http.html] + [Referrer Policy: Expects origin for fetch to same-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/fetch/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/fetch/same-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..0c4227c0aff --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/fetch/same-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.swap-origin.http.html] + [Referrer Policy: Expects origin for fetch to same-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/img-tag/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/img-tag/cross-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..358acfa9e3d --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/img-tag/cross-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.keep-origin.http.html] + [Referrer Policy: Expects origin for img-tag to cross-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/img-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/img-tag/cross-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..88098c53a70 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/img-tag/cross-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.no-redirect.http.html] + [Referrer Policy: Expects origin for img-tag to cross-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/img-tag/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/img-tag/cross-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..fdc78287b2f --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/img-tag/cross-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.swap-origin.http.html] + [Referrer Policy: Expects origin for img-tag to cross-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/img-tag/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/img-tag/cross-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..1ef2b4acd86 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/img-tag/cross-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.keep-origin.http.html] + [Referrer Policy: Expects origin for img-tag to cross-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/img-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/img-tag/cross-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..f8a94a488bd --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/img-tag/cross-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.no-redirect.http.html] + [Referrer Policy: Expects origin for img-tag to cross-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/img-tag/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/img-tag/cross-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..b5f9a3e23c4 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/img-tag/cross-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.swap-origin.http.html] + [Referrer Policy: Expects origin for img-tag to cross-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/img-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/img-tag/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..a51b9ca809f --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/img-tag/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects origin for img-tag to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/img-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/img-tag/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..120396a21dc --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/img-tag/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects origin for img-tag to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/img-tag/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/img-tag/same-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..dc161000188 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/img-tag/same-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.swap-origin.http.html] + [Referrer Policy: Expects origin for img-tag to same-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/img-tag/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/img-tag/same-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..99de401fdb1 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/img-tag/same-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.keep-origin.http.html] + [Referrer Policy: Expects origin for img-tag to same-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/img-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/img-tag/same-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..5ac598c79b4 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/img-tag/same-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-https.no-redirect.http.html] + [Referrer Policy: Expects origin for img-tag to same-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/img-tag/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/img-tag/same-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..f82362f5401 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/img-tag/same-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.swap-origin.http.html] + [Referrer Policy: Expects origin for img-tag to same-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/sharedworker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/sharedworker-classic/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..10ed4751d38 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/sharedworker-classic/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects origin for sharedworker-classic to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/sharedworker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/sharedworker-classic/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..3f3d2028ec1 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/sharedworker-classic/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects origin for sharedworker-classic to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/sharedworker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/sharedworker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..7a2cad3c568 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/sharedworker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects origin for sharedworker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/sharedworker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/sharedworker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..662d2d3d61d --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/sharedworker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects origin for sharedworker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/worker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/worker-classic/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..db5928d7021 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/worker-classic/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects origin for worker-classic to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/worker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/worker-classic/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..b53b10f4a28 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/worker-classic/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects origin for worker-classic to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/worker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/worker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..c332d93674e --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/worker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects origin for worker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/worker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/worker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..e56c7152d59 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/origin/worker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects origin for worker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/same-origin/a-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/same-origin/a-tag/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..f98dab23238 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/same-origin/a-tag/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/same-origin/fetch/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/same-origin/fetch/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..2c6850e5fa3 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/same-origin/fetch/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/same-origin/fetch/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/same-origin/fetch/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..2ecc2991bbd --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/same-origin/fetch/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/same-origin/img-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/same-origin/img-tag/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..e96f3886ac5 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/same-origin/img-tag/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/same-origin/img-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/same-origin/img-tag/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..6561c0d884b --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/same-origin/img-tag/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..20ab9e1af17 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..f322f695f8a --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/same-origin/sharedworker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/same-origin/sharedworker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..38398373b2f --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/same-origin/sharedworker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/same-origin/sharedworker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/same-origin/sharedworker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..d80f88fc6bf --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/same-origin/sharedworker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/same-origin/worker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/same-origin/worker-classic/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..030b0ca9bb2 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/same-origin/worker-classic/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/same-origin/worker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/same-origin/worker-classic/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..95284119022 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/same-origin/worker-classic/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/same-origin/worker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/same-origin/worker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..35ef0f39fd2 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/same-origin/worker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/same-origin/worker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/same-origin/worker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..f78cf5bf0ec --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/same-origin/worker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..44a2d7f60d4 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.no-redirect.http.html] + [Referrer Policy: Expects origin for a-tag to cross-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..e6440352801 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.no-redirect.http.html] + [Referrer Policy: Expects origin for a-tag to cross-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..f98dab23238 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/a-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/a-tag/same-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..c3bdc1c7b55 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/a-tag/same-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-https.no-redirect.http.html] + [Referrer Policy: Expects origin for a-tag to same-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..0d9c9ff0afa --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.keep-origin.http.html] + [Referrer Policy: Expects origin for fetch to cross-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..3d593d8b0b9 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.no-redirect.http.html] + [Referrer Policy: Expects origin for fetch to cross-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..79eae6e3b9d --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.swap-origin.http.html] + [Referrer Policy: Expects origin for fetch to cross-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..2911a9e60a5 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.keep-origin.http.html] + [Referrer Policy: Expects origin for fetch to cross-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..5ea4a082de3 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.no-redirect.http.html] + [Referrer Policy: Expects origin for fetch to cross-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..280a8921247 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.swap-origin.http.html] + [Referrer Policy: Expects origin for fetch to cross-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..2c6850e5fa3 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..2ecc2991bbd --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..9abdc225d4a --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.swap-origin.http.html] + [Referrer Policy: Expects origin for fetch to same-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..d204df6ff1e --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.keep-origin.http.html] + [Referrer Policy: Expects origin for fetch to same-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..837ba368f4d --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-https.no-redirect.http.html] + [Referrer Policy: Expects origin for fetch to same-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..0c4227c0aff --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.swap-origin.http.html] + [Referrer Policy: Expects origin for fetch to same-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..358acfa9e3d --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.keep-origin.http.html] + [Referrer Policy: Expects origin for img-tag to cross-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..88098c53a70 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.no-redirect.http.html] + [Referrer Policy: Expects origin for img-tag to cross-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..fdc78287b2f --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.swap-origin.http.html] + [Referrer Policy: Expects origin for img-tag to cross-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..1ef2b4acd86 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.keep-origin.http.html] + [Referrer Policy: Expects origin for img-tag to cross-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..f8a94a488bd --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.no-redirect.http.html] + [Referrer Policy: Expects origin for img-tag to cross-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..b5f9a3e23c4 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.swap-origin.http.html] + [Referrer Policy: Expects origin for img-tag to cross-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..e96f3886ac5 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..6561c0d884b --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..dc161000188 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.swap-origin.http.html] + [Referrer Policy: Expects origin for img-tag to same-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..99de401fdb1 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.keep-origin.http.html] + [Referrer Policy: Expects origin for img-tag to same-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..5ac598c79b4 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-https.no-redirect.http.html] + [Referrer Policy: Expects origin for img-tag to same-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..f82362f5401 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.swap-origin.http.html] + [Referrer Policy: Expects origin for img-tag to same-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..20ab9e1af17 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..f322f695f8a --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..38398373b2f --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..d80f88fc6bf --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..030b0ca9bb2 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..95284119022 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..35ef0f39fd2 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..f78cf5bf0ec --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/a-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/a-tag/cross-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..44a2d7f60d4 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/a-tag/cross-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.no-redirect.http.html] + [Referrer Policy: Expects origin for a-tag to cross-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/a-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/a-tag/cross-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..e6440352801 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/a-tag/cross-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.no-redirect.http.html] + [Referrer Policy: Expects origin for a-tag to cross-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/a-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/a-tag/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..b406f5fa517 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/a-tag/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects origin for a-tag to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/a-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/a-tag/same-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..c3bdc1c7b55 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/a-tag/same-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-https.no-redirect.http.html] + [Referrer Policy: Expects origin for a-tag to same-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..0d9c9ff0afa --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.keep-origin.http.html] + [Referrer Policy: Expects origin for fetch to cross-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..3d593d8b0b9 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.no-redirect.http.html] + [Referrer Policy: Expects origin for fetch to cross-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..79eae6e3b9d --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.swap-origin.http.html] + [Referrer Policy: Expects origin for fetch to cross-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..2911a9e60a5 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.keep-origin.http.html] + [Referrer Policy: Expects origin for fetch to cross-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..5ea4a082de3 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.no-redirect.http.html] + [Referrer Policy: Expects origin for fetch to cross-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..280a8921247 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.swap-origin.http.html] + [Referrer Policy: Expects origin for fetch to cross-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/fetch/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/fetch/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..e821f119755 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/fetch/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects origin for fetch to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/fetch/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/fetch/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..d52522e6f1b --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/fetch/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects origin for fetch to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/fetch/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/fetch/same-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..9abdc225d4a --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/fetch/same-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.swap-origin.http.html] + [Referrer Policy: Expects origin for fetch to same-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/fetch/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/fetch/same-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..d204df6ff1e --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/fetch/same-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.keep-origin.http.html] + [Referrer Policy: Expects origin for fetch to same-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/fetch/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/fetch/same-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..837ba368f4d --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/fetch/same-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-https.no-redirect.http.html] + [Referrer Policy: Expects origin for fetch to same-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/fetch/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/fetch/same-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..0c4227c0aff --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/fetch/same-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.swap-origin.http.html] + [Referrer Policy: Expects origin for fetch to same-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..358acfa9e3d --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.keep-origin.http.html] + [Referrer Policy: Expects origin for img-tag to cross-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..88098c53a70 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.no-redirect.http.html] + [Referrer Policy: Expects origin for img-tag to cross-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..fdc78287b2f --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.swap-origin.http.html] + [Referrer Policy: Expects origin for img-tag to cross-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..1ef2b4acd86 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.keep-origin.http.html] + [Referrer Policy: Expects origin for img-tag to cross-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..f8a94a488bd --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.no-redirect.http.html] + [Referrer Policy: Expects origin for img-tag to cross-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..b5f9a3e23c4 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.swap-origin.http.html] + [Referrer Policy: Expects origin for img-tag to cross-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..a51b9ca809f --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects origin for img-tag to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..120396a21dc --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects origin for img-tag to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..dc161000188 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.swap-origin.http.html] + [Referrer Policy: Expects origin for img-tag to same-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..99de401fdb1 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.keep-origin.http.html] + [Referrer Policy: Expects origin for img-tag to same-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..5ac598c79b4 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-https.no-redirect.http.html] + [Referrer Policy: Expects origin for img-tag to same-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..f82362f5401 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.swap-origin.http.html] + [Referrer Policy: Expects origin for img-tag to same-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/sharedworker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/sharedworker-classic/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..10ed4751d38 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/sharedworker-classic/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects origin for sharedworker-classic to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/sharedworker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/sharedworker-classic/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..3f3d2028ec1 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/sharedworker-classic/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects origin for sharedworker-classic to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/sharedworker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/sharedworker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..7a2cad3c568 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/sharedworker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects origin for sharedworker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/sharedworker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/sharedworker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..662d2d3d61d --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/sharedworker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects origin for sharedworker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/worker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/worker-classic/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..db5928d7021 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/worker-classic/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects origin for worker-classic to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/worker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/worker-classic/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..b53b10f4a28 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/worker-classic/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects origin for worker-classic to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/worker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/worker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..c332d93674e --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/worker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects origin for worker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/worker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/worker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..e56c7152d59 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/strict-origin/worker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects origin for worker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/a-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/a-tag/cross-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..8e1467fd5dc --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/a-tag/cross-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for a-tag to cross-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/a-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/a-tag/cross-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..820fbb8b9a0 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/a-tag/cross-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for a-tag to cross-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/a-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/a-tag/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..f98dab23238 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/a-tag/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/a-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/a-tag/same-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..5632f78d691 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/a-tag/same-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-https.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for a-tag to same-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..c9f7c2fb60d --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..61d6744ced9 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..dc1bdf34daa --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..0aee26bf829 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..c9ab629d57b --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..053ac616f7c --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..2c6850e5fa3 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..2ecc2991bbd --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..f0751aa19da --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..53c9bd753f9 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..c510847fb55 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-https.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..f04ba7626e7 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..e573ebdacfe --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..2f88fc74db1 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..5786a158425 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..3eab15bf597 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..45e22877ec5 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..dc21784d553 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..e96f3886ac5 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..6561c0d884b --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..fbddf04c0ab --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..b1230ba6b6c --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..74dabecc45e --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-https.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..5cadfec54d8 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..20ab9e1af17 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..f322f695f8a --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/sharedworker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/sharedworker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..38398373b2f --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/sharedworker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/sharedworker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/sharedworker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..d80f88fc6bf --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/sharedworker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..030b0ca9bb2 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..95284119022 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/worker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/worker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..35ef0f39fd2 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/worker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/worker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/worker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..f78cf5bf0ec --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unsafe-url/worker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/a-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/a-tag/cross-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..8e1467fd5dc --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/a-tag/cross-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for a-tag to cross-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/a-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/a-tag/cross-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..820fbb8b9a0 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/a-tag/cross-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for a-tag to cross-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/a-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/a-tag/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..f98dab23238 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/a-tag/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/a-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/a-tag/same-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..5632f78d691 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/a-tag/same-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-https.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for a-tag to same-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/fetch/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/fetch/cross-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..c9f7c2fb60d --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/fetch/cross-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/fetch/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/fetch/cross-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..61d6744ced9 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/fetch/cross-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/fetch/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/fetch/cross-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..dc1bdf34daa --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/fetch/cross-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/fetch/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/fetch/cross-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..0aee26bf829 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/fetch/cross-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/fetch/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/fetch/cross-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..c9ab629d57b --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/fetch/cross-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/fetch/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/fetch/cross-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..053ac616f7c --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/fetch/cross-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/fetch/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/fetch/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..2c6850e5fa3 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/fetch/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/fetch/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/fetch/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..2ecc2991bbd --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/fetch/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/fetch/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/fetch/same-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..f0751aa19da --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/fetch/same-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/fetch/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/fetch/same-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..53c9bd753f9 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/fetch/same-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/fetch/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/fetch/same-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..c510847fb55 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/fetch/same-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-https.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/fetch/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/fetch/same-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..f04ba7626e7 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/fetch/same-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/img-tag/cross-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/img-tag/cross-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..e573ebdacfe --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/img-tag/cross-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/img-tag/cross-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/img-tag/cross-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..2f88fc74db1 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/img-tag/cross-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/img-tag/cross-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/img-tag/cross-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..5786a158425 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/img-tag/cross-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-http.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/img-tag/cross-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/img-tag/cross-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..3eab15bf597 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/img-tag/cross-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/img-tag/cross-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/img-tag/cross-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..45e22877ec5 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/img-tag/cross-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/img-tag/cross-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/img-tag/cross-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..dc21784d553 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/img-tag/cross-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[cross-https.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/img-tag/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/img-tag/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..e96f3886ac5 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/img-tag/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/img-tag/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/img-tag/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..6561c0d884b --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/img-tag/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/img-tag/same-http.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/img-tag/same-http.swap-origin.http.html.ini new file mode 100644 index 00000000000..fbddf04c0ab --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/img-tag/same-http.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/img-tag/same-https.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/img-tag/same-https.keep-origin.http.html.ini new file mode 100644 index 00000000000..b1230ba6b6c --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/img-tag/same-https.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/img-tag/same-https.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/img-tag/same-https.no-redirect.http.html.ini new file mode 100644 index 00000000000..74dabecc45e --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/img-tag/same-https.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-https.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/img-tag/same-https.swap-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/img-tag/same-https.swap-origin.http.html.ini new file mode 100644 index 00000000000..5cadfec54d8 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/img-tag/same-https.swap-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-https.swap-origin.http.html] + [Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and swap-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/sharedworker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/sharedworker-classic/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..20ab9e1af17 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/sharedworker-classic/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/sharedworker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/sharedworker-classic/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..f322f695f8a --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/sharedworker-classic/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/sharedworker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/sharedworker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..38398373b2f --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/sharedworker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/sharedworker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/sharedworker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..d80f88fc6bf --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/sharedworker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/worker-classic/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/worker-classic/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..030b0ca9bb2 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/worker-classic/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/worker-classic/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/worker-classic/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..95284119022 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/worker-classic/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/worker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/worker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..35ef0f39fd2 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/worker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/worker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/worker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..f78cf5bf0ec --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/iframe.meta/unset/worker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..38398373b2f --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..d80f88fc6bf --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/sharedworker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/sharedworker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..dea778a0734 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/sharedworker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects omitted for sharedworker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/sharedworker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/sharedworker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..16ba8fe670e --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/no-referrer/sharedworker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects omitted for sharedworker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..38398373b2f --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..d80f88fc6bf --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/sharedworker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/sharedworker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..7a2cad3c568 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/sharedworker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects origin for sharedworker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/sharedworker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/sharedworker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..662d2d3d61d --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/origin/sharedworker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects origin for sharedworker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/sharedworker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/sharedworker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..38398373b2f --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/sharedworker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/sharedworker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/sharedworker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..d80f88fc6bf --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/same-origin/sharedworker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..38398373b2f --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..d80f88fc6bf --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/sharedworker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/sharedworker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..7a2cad3c568 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/sharedworker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects origin for sharedworker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/sharedworker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/sharedworker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..662d2d3d61d --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/strict-origin/sharedworker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects origin for sharedworker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..38398373b2f --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..d80f88fc6bf --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/sharedworker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/sharedworker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..38398373b2f --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/sharedworker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/sharedworker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/sharedworker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..d80f88fc6bf --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/top.http-rp/unset/sharedworker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..38398373b2f --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..d80f88fc6bf --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer/sharedworker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer/sharedworker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..dea778a0734 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer/sharedworker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects omitted for sharedworker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer/sharedworker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer/sharedworker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..16ba8fe670e --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/no-referrer/sharedworker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects omitted for sharedworker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..38398373b2f --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..d80f88fc6bf --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/sharedworker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/sharedworker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..7a2cad3c568 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/sharedworker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects origin for sharedworker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/sharedworker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/sharedworker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..662d2d3d61d --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/origin/sharedworker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects origin for sharedworker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/sharedworker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/sharedworker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..38398373b2f --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/sharedworker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/sharedworker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/sharedworker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..d80f88fc6bf --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/same-origin/sharedworker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..38398373b2f --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..d80f88fc6bf --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/sharedworker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/sharedworker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..7a2cad3c568 --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/sharedworker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects origin for sharedworker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/sharedworker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/sharedworker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..662d2d3d61d --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/strict-origin/sharedworker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects origin for sharedworker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/sharedworker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/sharedworker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..38398373b2f --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/sharedworker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/sharedworker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/sharedworker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..d80f88fc6bf --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unsafe-url/sharedworker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/sharedworker-module/same-http.keep-origin.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/sharedworker-module/same-http.keep-origin.http.html.ini new file mode 100644 index 00000000000..38398373b2f --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/sharedworker-module/same-http.keep-origin.http.html.ini @@ -0,0 +1,4 @@ +[same-http.keep-origin.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/sharedworker-module/same-http.no-redirect.http.html.ini b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/sharedworker-module/same-http.no-redirect.http.html.ini new file mode 100644 index 00000000000..d80f88fc6bf --- /dev/null +++ b/tests/wpt/metadata/referrer-policy/gen/top.meta/unset/sharedworker-module/same-http.no-redirect.http.html.ini @@ -0,0 +1,4 @@ +[same-http.no-redirect.http.html] + [Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context.] + expected: FAIL + diff --git a/tests/wpt/metadata/webaudio/the-audio-api/the-audioworklet-interface/process-getter.https.html.ini b/tests/wpt/metadata/webaudio/the-audio-api/the-audioworklet-interface/process-getter.https.html.ini new file mode 100644 index 00000000000..5debf5a0839 --- /dev/null +++ b/tests/wpt/metadata/webaudio/the-audio-api/the-audioworklet-interface/process-getter.https.html.ini @@ -0,0 +1,7 @@ +[process-getter.https.html] + ['process' getter on instance] + expected: FAIL + + ['process' getter on prototype] + expected: FAIL + diff --git a/tests/wpt/metadata/webaudio/the-audio-api/the-audioworklet-interface/process-parameters.https.html.ini b/tests/wpt/metadata/webaudio/the-audio-api/the-audioworklet-interface/process-parameters.https.html.ini new file mode 100644 index 00000000000..3827a45a836 --- /dev/null +++ b/tests/wpt/metadata/webaudio/the-audio-api/the-audioworklet-interface/process-parameters.https.html.ini @@ -0,0 +1,8 @@ +[process-parameters.https.html] + expected: ERROR + [0 inputs; 3 outputs] + expected: NOTRUN + + [3 inputs; 0 outputs] + expected: NOTRUN + diff --git a/tests/wpt/metadata/webaudio/the-audio-api/the-audioworklet-interface/processor-construction-port.https.html.ini b/tests/wpt/metadata/webaudio/the-audio-api/the-audioworklet-interface/processor-construction-port.https.html.ini new file mode 100644 index 00000000000..1e8337002b0 --- /dev/null +++ b/tests/wpt/metadata/webaudio/the-audio-api/the-audioworklet-interface/processor-construction-port.https.html.ini @@ -0,0 +1,13 @@ +[processor-construction-port.https.html] + [Singleton AudioWorkletProcessor] + expected: FAIL + + [new AudioWorkletProcessor() after super()] + expected: FAIL + + [new AudioWorkletProcessor() after new AudioWorkletProcessor()] + expected: FAIL + + [super() after new AudioWorkletProcessor()] + expected: FAIL + diff --git a/tests/wpt/web-platform-tests/common/arrays.js b/tests/wpt/web-platform-tests/common/arrays.js index 49431dd78ad..2b31bb4179c 100644 --- a/tests/wpt/web-platform-tests/common/arrays.js +++ b/tests/wpt/web-platform-tests/common/arrays.js @@ -1,4 +1,19 @@ -// Returns true if the given arrays are equal. Optionally can pass an equality function. +/** + * Callback for checking equality of c and d. + * + * @callback equalityCallback + * @param {*} c + * @param {*} d + * @returns {boolean} + */ + +/** + * Returns true if the given arrays are equal. Optionally can pass an equality function. + * @param {Array} a + * @param {Array} b + * @param {equalityCallback} callbackFunction - defaults to `c === d` + * @returns {boolean} + */ export function areArraysEqual(a, b, equalityFunction = (c, d) => { return c === d; }) { try { if (a.length !== b.length) diff --git a/tests/wpt/web-platform-tests/common/get-host-info.sub.js b/tests/wpt/web-platform-tests/common/get-host-info.sub.js index 1fbf2dbc687..1c28a7f476f 100644 --- a/tests/wpt/web-platform-tests/common/get-host-info.sub.js +++ b/tests/wpt/web-platform-tests/common/get-host-info.sub.js @@ -1,3 +1,7 @@ +/** + * Host information for cross-origin tests. + * @returns {Object} with properties for different host information. + */ function get_host_info() { var HTTP_PORT = '{{ports[http][0]}}'; @@ -38,10 +42,13 @@ function get_host_info() { }; } +/** + * When a default port is used, location.port returns the empty string. + * This function attempts to provide an exact port, assuming we are running under wptserve. + * @param {*} loc - can be Location/<a>/<area>/URL, but assumes http/https only. + * @returns {string} The port number. + */ function get_port(loc) { - // When a default port is used, location.port returns the empty string. - // To compare with wptserve `ports` substitution we need a port... - // loc can be Location/<a>/<area>/URL, but assumes http/https only. if (loc.port) { return loc.port; } diff --git a/tests/wpt/web-platform-tests/common/media.js b/tests/wpt/web-platform-tests/common/media.js index 7cea1ac9b3c..e9b1e6b0fbe 100644 --- a/tests/wpt/web-platform-tests/common/media.js +++ b/tests/wpt/web-platform-tests/common/media.js @@ -1,6 +1,8 @@ -// -// Returns the URI of a supported video source based on the user agent -// +/** + * Returns the URL of a supported video source based on the user agent + * @param {string} base - media URL without file extension + * @returns {string} + */ function getVideoURI(base) { var extension = '.mp4'; @@ -16,9 +18,11 @@ function getVideoURI(base) return base + extension; } -// -// Returns the URI of a supported audio source based on the user agent -// +/** + * Returns the URL of a supported audio source based on the user agent + * @param {string} base - media URL without file extension + * @returns {string} + */ function getAudioURI(base) { var extension = '.mp3'; @@ -34,6 +38,11 @@ function getAudioURI(base) return base + extension; } +/** + * Returns the MIME type for a media URL based on the file extension. + * @param {string} url + * @returns {string} + */ function getMediaContentType(url) { var extension = new URL(url, location).pathname.split(".").pop(); var map = { diff --git a/tests/wpt/web-platform-tests/common/object-association.js b/tests/wpt/web-platform-tests/common/object-association.js index d58f94b62d6..458aae67db0 100644 --- a/tests/wpt/web-platform-tests/common/object-association.js +++ b/tests/wpt/web-platform-tests/common/object-association.js @@ -2,6 +2,10 @@ // For now this only has per-Window tests, but we could expand it to also test per-Document +/** + * Run tests for window[propertyName] after discarding the browsing context, navigating, etc. + * @param {string} propertyName + */ window.testIsPerWindow = propertyName => { test(t => { const iframe = document.createElement("iframe"); diff --git a/tests/wpt/web-platform-tests/common/reftest-wait.js b/tests/wpt/web-platform-tests/common/reftest-wait.js index 87816f83452..0a30a197f07 100644 --- a/tests/wpt/web-platform-tests/common/reftest-wait.js +++ b/tests/wpt/web-platform-tests/common/reftest-wait.js @@ -1,7 +1,18 @@ +/** + * Remove the `reftest-wait` class on the document element. + * The reftest runner will wait with taking a screenshot while + * this class is present. + * + * See https://web-platform-tests.org/writing-tests/reftests.html#controlling-when-comparison-occurs + */ function takeScreenshot() { document.documentElement.classList.remove("reftest-wait"); } +/** + * Call `takeScreenshot()` after a delay of at least |timeout| milliseconds. + * @param {number} timeout - milliseconds + */ function takeScreenshotDelayed(timeout) { setTimeout(function() { takeScreenshot(); diff --git a/tests/wpt/web-platform-tests/common/security-features/resources/common.sub.js b/tests/wpt/web-platform-tests/common/security-features/resources/common.sub.js index cdd20a9d8da..ed7c32b8ce1 100644 --- a/tests/wpt/web-platform-tests/common/security-features/resources/common.sub.js +++ b/tests/wpt/web-platform-tests/common/security-features/resources/common.sub.js @@ -542,10 +542,10 @@ function requestViaDedicatedWorker(url, options) { .then(event => wrapResult(event.data)); } -function requestViaSharedWorker(url) { +function requestViaSharedWorker(url, options) { var worker; try { - worker = new SharedWorker(url); + worker = new SharedWorker(url, options); } catch(e) { return Promise.reject(e); } @@ -918,7 +918,11 @@ const subresourceMap = { }, "sharedworker-classic": { path: "/common/security-features/subresource/shared-worker.py", - invoker: requestViaSharedWorker, + invoker: url => requestViaSharedWorker(url), + }, + "sharedworker-module": { + path: "/common/security-features/subresource/shared-worker.py", + invoker: url => requestViaSharedWorker(url, {type: "module"}), }, "websocket": { diff --git a/tests/wpt/web-platform-tests/common/stringifiers.js b/tests/wpt/web-platform-tests/common/stringifiers.js index 63544f9ed00..4ef7a1bfeda 100644 --- a/tests/wpt/web-platform-tests/common/stringifiers.js +++ b/tests/wpt/web-platform-tests/common/stringifiers.js @@ -1,4 +1,9 @@ -// Tests <http://heycam.github.io/webidl/#es-stringifier>. +/** + * Runs tests for <http://heycam.github.io/webidl/#es-stringifier>. + * @param {Object} aObject - object to test + * @param {string} aAttribute - IDL attribute name that is annotated with `stringifier` + * @param {boolean} aIsUnforgeable - whether the IDL attribute is `[Unforgeable]` + */ function test_stringifier_attribute(aObject, aAttribute, aIsUnforgeable) { // Step 1. test(function() { diff --git a/tests/wpt/web-platform-tests/common/subset-tests-by-key.js b/tests/wpt/web-platform-tests/common/subset-tests-by-key.js index d87ea9f76ee..483017a6448 100644 --- a/tests/wpt/web-platform-tests/common/subset-tests-by-key.js +++ b/tests/wpt/web-platform-tests/common/subset-tests-by-key.js @@ -1,9 +1,3 @@ -// Only test a subset of tests with ?include=Foo or ?exclude=Foo in the URL. -// Can be used together with <meta name="variant" content="..."> -// Sample usage: -// for (const test of tests) { -// subsetTestByKey("Foo", async_test, test.fn, test.name); -// } (function() { var subTestKeyPattern = null; var match; @@ -48,6 +42,11 @@ }); } } + /** + * Check if `key` is in the subset specified in the URL. + * @param {string} key + * @returns {boolean} + */ function shouldRunSubTest(key) { if (key && subTestKeyPattern) { var found = subTestKeyPattern.test(key); @@ -58,7 +57,15 @@ } return true; } - function subsetTestByKey(key, testFunc, ...args) { + /** + * Only test a subset of tests with `?include=Foo` or `?exclude=Foo` in the URL. + * Can be used together with `<meta name="variant" content="...">` + * Sample usage: + * for (const test of tests) { + * subsetTestByKey("Foo", async_test, test.fn, test.name); + * } + */ + function subsetTestByKey(key, testFunc, ...args) { if (collectKeys) { if (collectCounts && key in keys) { keys[key]++; diff --git a/tests/wpt/web-platform-tests/common/subset-tests.js b/tests/wpt/web-platform-tests/common/subset-tests.js index 3713819c887..58e93413de4 100644 --- a/tests/wpt/web-platform-tests/common/subset-tests.js +++ b/tests/wpt/web-platform-tests/common/subset-tests.js @@ -1,9 +1,3 @@ -// Only test a subset of tests with, e.g., ?1-10 in the URL. -// Can be used together with <meta name="variant" content="..."> -// Sample usage: -// for (const test of tests) { -// subsetTest(async_test, test.fn, test.name); -// } (function() { var subTestStart = 0; var subTestEnd = Infinity; @@ -37,10 +31,23 @@ }); } } + /** + * Check if `currentSubTest` is in the subset specified in the URL. + * @param {number} currentSubTest + * @returns {boolean} + */ function shouldRunSubTest(currentSubTest) { return currentSubTest >= subTestStart && currentSubTest <= subTestEnd; } var currentSubTest = 0; + /** + * Only test a subset of tests with, e.g., `?1-10` in the URL. + * Can be used together with `<meta name="variant" content="...">` + * Sample usage: + * for (const test of tests) { + * subsetTest(async_test, test.fn, test.name); + * } + */ function subsetTest(testFunc, ...args) { currentSubTest++; if (shouldRunSubTest(currentSubTest)) { diff --git a/tests/wpt/web-platform-tests/common/utils.js b/tests/wpt/web-platform-tests/common/utils.js index bcdc256d917..62e742bee7f 100644 --- a/tests/wpt/web-platform-tests/common/utils.js +++ b/tests/wpt/web-platform-tests/common/utils.js @@ -1,3 +1,14 @@ +/** + * Create an absolute URL from `options` and defaulting unspecified properties to `window.location`. + * @param {Object} options - a `Location`-like object + * @param {string} options.hostname + * @param {string} options.subdomain - prepend subdomain to the hostname + * @param {string} options.port + * @param {string} options.path + * @param {string} options.query + * @param {string} options.hash + * @returns {string} + */ function make_absolute_url(options) { var loc = window.location; var protocol = get(options, "protocol", loc.protocol); @@ -41,6 +52,7 @@ function make_absolute_url(options) { return url; } +/** @private */ function get(obj, name, default_val) { if (obj.hasOwnProperty(name)) { return obj[name]; @@ -48,6 +60,10 @@ function get(obj, name, default_val) { return default_val; } +/** + * Generate a new UUID. + * @returns {string} + */ function token() { var uuid = [to_hex(rand_int(32), 8), to_hex(rand_int(16), 4), @@ -57,6 +73,7 @@ function token() { return uuid; } +/** @private */ function rand_int(bits) { if (bits < 1 || bits > 53) { throw new TypeError(); @@ -71,6 +88,7 @@ function rand_int(bits) { } } +/** @private */ function to_hex(x, length) { var rv = x.toString(16); while (rv.length < length) { diff --git a/tests/wpt/web-platform-tests/common/worklet-reftest.js b/tests/wpt/web-platform-tests/common/worklet-reftest.js index d92c76cabf3..e05d4ee801b 100644 --- a/tests/wpt/web-platform-tests/common/worklet-reftest.js +++ b/tests/wpt/web-platform-tests/common/worklet-reftest.js @@ -1,7 +1,12 @@ -// Imports code into a worklet. E.g. -// -// importWorklet(CSS.paintWorklet, {url: 'script.js'}); -// importWorklet(CSS.paintWorklet, '/* javascript string */'); +/** + * Imports code into a worklet. E.g. + * + * importWorklet(CSS.paintWorklet, {url: 'script.js'}); + * importWorklet(CSS.paintWorklet, '(javascript string)'); + * + * @param {Worklet} worklet + * @param {(Object|string)} code + */ function importWorklet(worklet, code) { let url; if (typeof code === 'object') { @@ -14,18 +19,25 @@ function importWorklet(worklet, code) { return worklet.addModule(url); } +/** @private */ async function animationFrames(frames) { for (let i = 0; i < frames; i++) await new Promise(requestAnimationFrame); } +/** @private */ async function workletPainted() { await animationFrames(2); } -// To make sure that we take the snapshot at the right time, we do double -// requestAnimationFrame. In the second frame, we take a screenshot, that makes -// sure that we already have a full frame. +/** + * To make sure that we take the snapshot at the right time, we do double + * requestAnimationFrame. In the second frame, we take a screenshot, that makes + * sure that we already have a full frame. + * + * @param {Worklet} worklet + * @param {(Object|string)} code + */ async function importWorkletAndTerminateTestAfterAsyncPaint(worklet, code) { if (typeof worklet === 'undefined') { takeScreenshot(); diff --git a/tests/wpt/web-platform-tests/content-security-policy/reporting/report-clips-sample.html b/tests/wpt/web-platform-tests/content-security-policy/reporting/report-clips-sample.html new file mode 100644 index 00000000000..cb69c930fc1 --- /dev/null +++ b/tests/wpt/web-platform-tests/content-security-policy/reporting/report-clips-sample.html @@ -0,0 +1,45 @@ +<!DOCTYPE html> +<html> +<head> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/content-security-policy/support/testharness-helper.js"></script> + <meta http-equiv="Content-Security-Policy" + content="require-trusted-types-for 'script'; trusted-types default"> +</head> +<body> + <script> + promise_test(t => { + let evil = false; + assert_throws(new EvalError(), _ => { + eval("evil = '1234567890123456789012345678901234567890';"); + }); + assert_false(evil); + return waitUntilCSPEventForTrustedTypes(t).then(t.step_func_done(e => { + assert_equals(e.sample, "eval evil = '12345678901234567890123456789012"); + })); + }, "Unsafe eval violation sample is clipped to 40 characters."); + + promise_test(t => { + assert_throws(new EvalError(), _ => { + new Function("a", "b", "return '1234567890123456789012345678901234567890';"); + }); + return waitUntilCSPEventForTrustedTypes(t).then(t.step_func_done(e => { + assert_equals(e.sample.replace(/\n/g, ""), + "eval (function anonymous(a,b) {return '1234"); + })); + }, "Function constructor - the other kind of eval - is clipped."); + + promise_test(t => { + const a = document.createElement("a"); + assert_throws(new TypeError(), _ => { + a.innerHTML = "1234567890123456789012345678901234567890xxxx"; + }); + assert_equals(a.innerHTML, ""); + return waitUntilCSPEventForTrustedTypes(t).then(t.step_func_done(e => { + assert_equals(e.sample, "Element.innerHTML 1234567890123456789012345678901234567890"); + })); + }, "Trusted Types violation sample is clipped to 40 characters excluded the sink name."); + </script> +</body> +</html> diff --git a/tests/wpt/web-platform-tests/content-security-policy/support/testharness-helper.js b/tests/wpt/web-platform-tests/content-security-policy/support/testharness-helper.js index c071a689315..0e68c7267a4 100644 --- a/tests/wpt/web-platform-tests/content-security-policy/support/testharness-helper.js +++ b/tests/wpt/web-platform-tests/content-security-policy/support/testharness-helper.js @@ -10,22 +10,25 @@ function assert_no_event(test, obj, name) { obj.addEventListener(name, test.unreached_func("The '" + name + "' event should not have fired.")); } -function waitUntilCSPEventForURL(test, url) { +function waitUntilCSPEventForURLOrLine(test, url, line) { return new Promise((resolve, reject) => { self.addEventListener("securitypolicyviolation", test.step_func(e => { - if (e.blockedURI == url) + if (e.blockedURI == url && (!line || line == e.lineNumber)) resolve(e); })); }); } +function waitUntilCSPEventForURL(test, url) { + return waitUntilCSPEventForURLOrLine(test, url); +} + function waitUntilCSPEventForEval(test, line) { - return new Promise((resolve, reject) => { - self.addEventListener("securitypolicyviolation", test.step_func(e => { - if (e.blockedURI == "eval" && e.lineNumber == line) - resolve(e); - })); - }); + return waitUntilCSPEventForURLOrLine(test, "eval", line); +} + +function waitUntilCSPEventForTrustedTypes(test) { + return waitUntilCSPEventForURLOrLine(test, "trusted-types-sink"); } function waitUntilEvent(obj, name) { diff --git a/tests/wpt/web-platform-tests/css/compositing/mix-blend-mode/reference/mix-blend-mode-parent-element-overflow-scroll-blended-position-fixed-ref.html b/tests/wpt/web-platform-tests/css/compositing/mix-blend-mode/reference/mix-blend-mode-parent-element-overflow-scroll-blended-position-fixed-ref.html index f88bfde0c5c..fd780ee3ccb 100644 --- a/tests/wpt/web-platform-tests/css/compositing/mix-blend-mode/reference/mix-blend-mode-parent-element-overflow-scroll-blended-position-fixed-ref.html +++ b/tests/wpt/web-platform-tests/css/compositing/mix-blend-mode/reference/mix-blend-mode-parent-element-overflow-scroll-blended-position-fixed-ref.html @@ -30,7 +30,7 @@ </style> </head> <body> - <p>Test passes if you see a blue square inside a bigger aqua container. <br> + <p>Test passes if you see a blue square inside an aqua container. <br> The aqua container should have scrollbars on the left and bottom.</p> <div class="parent"> <div class="blended"></div> diff --git a/tests/wpt/web-platform-tests/css/compositing/svg/mix-blend-mode-in-svg-image.html b/tests/wpt/web-platform-tests/css/compositing/svg/mix-blend-mode-in-svg-image.html index 658e0275d70..ed0520e443f 100644 --- a/tests/wpt/web-platform-tests/css/compositing/svg/mix-blend-mode-in-svg-image.html +++ b/tests/wpt/web-platform-tests/css/compositing/svg/mix-blend-mode-in-svg-image.html @@ -8,7 +8,7 @@ <link rel="help" href="https://drafts.fxtf.org/compositing-1/#csscompositingrules_SVG"> <link rel="help" href="https://drafts.fxtf.org/compositing-1/#mix-blend-mode"> <meta name="flags" content="svg"> - <link rel="match" href="reference/mix-blend-mode-svg-rectangle-ref.html"> + <link rel="match" href="reference/mix-blend-mode-in-svg-image-ref.html"> </head> <body> <p>There should be a green rectangle on the screen. <br> diff --git a/tests/wpt/web-platform-tests/css/compositing/svg/reference/mix-blend-mode-in-svg-image-ref.html b/tests/wpt/web-platform-tests/css/compositing/svg/reference/mix-blend-mode-in-svg-image-ref.html new file mode 100644 index 00000000000..9a2a0307374 --- /dev/null +++ b/tests/wpt/web-platform-tests/css/compositing/svg/reference/mix-blend-mode-in-svg-image-ref.html @@ -0,0 +1,20 @@ +<!DOCTYPE html> +<html> + <head> + <meta charset="utf-8"> + <title>CSS Reftest Reference</title> + <link rel="author" title="Mirela Budăeș" href="mailto:mbudaes@adobe.com"> + <style> + div { + width: 100px; + height:100px; + background-color: #0F0; + } + </style> + </head> + <body> + <p>There should be a green rectangle on the screen. <br> + Test passes if you see a green rectangle.</p> + <div></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/css/css-animations/Document-getAnimations.tentative.html b/tests/wpt/web-platform-tests/css/css-animations/Document-getAnimations.tentative.html index ba8c6d9194e..4a9768a8b61 100644 --- a/tests/wpt/web-platform-tests/css/css-animations/Document-getAnimations.tentative.html +++ b/tests/wpt/web-platform-tests/css/css-animations/Document-getAnimations.tentative.html @@ -50,6 +50,24 @@ test(t => { test(t => { const div = addDiv(t); + const animation1 = 'animLeft 100s' + const animation2 = 'animBottom 100s' + div.style.animation = animation1; + const animations1 = document.getAnimations(); + assert_equals(animations1.length, 1, + 'getAnimations returns all running CSS Animations'); + div.style.animation = animation2 + ', ' + animation1; + const animations = document.getAnimations(); + assert_equals(animations.length, 2, + 'getAnimations returns all running CSS Animations'); + assert_equals(animations[0].animationName, 'animBottom', + 'Order of first animation returned'); + assert_equals(animations[1].animationName, 'animLeft', + 'Order of second animation returned'); +}, 'Order of CSS Animations - within an element unaffected by start time'); + +test(t => { + const div = addDiv(t); div.style.animation = 'animLeft 100s, animTop 100s, animRight 100s, ' + 'animBottom 100s'; diff --git a/tests/wpt/web-platform-tests/css/css-animations/Element-getAnimations.tentative.html b/tests/wpt/web-platform-tests/css/css-animations/Element-getAnimations.tentative.html index 5419e11e653..284b2493403 100644 --- a/tests/wpt/web-platform-tests/css/css-animations/Element-getAnimations.tentative.html +++ b/tests/wpt/web-platform-tests/css/css-animations/Element-getAnimations.tentative.html @@ -303,8 +303,8 @@ test(t => { '#target::before': 'animation: anim1 10s;' }); const target = addDiv(t, { 'id': 'target' }); target.style.animation = 'anim1 100s'; - const animations = target.getAnimations({ subtree: false }); + assert_equals(animations.length, 1, 'Should find only the element'); assert_equals(animations[0].effect.target, target, @@ -317,8 +317,8 @@ test(t => { '#target::before': 'animation: anim1 10s;' }); const target = addDiv(t, { 'id': 'target' }); target.style.animation = 'anim1 100s'; - const animations = target.getAnimations({ subtree: true }); + assert_equals(animations.length, 3, 'getAnimations({ subtree: true }) ' + 'should return animations on pseudo-elements'); diff --git a/tests/wpt/web-platform-tests/css/css-images/image-set/image-set-parsing.html b/tests/wpt/web-platform-tests/css/css-images/image-set/image-set-parsing.html new file mode 100644 index 00000000000..bf17b2a8662 --- /dev/null +++ b/tests/wpt/web-platform-tests/css/css-images/image-set/image-set-parsing.html @@ -0,0 +1,53 @@ +<!DOCTYPE html> +<html> + <head> + <title>Image set parsing</title> + <link rel="author" title="Noam Rosenthal" href="mailto:noam.j.rosenthal@gmail.com"> + <link rel="help" href="https://drafts.csswg.org/css-images-4/#image-set-notation"> + <meta name="assert" content="General image-set parsing follows CSS Images 4 rules."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + </head> + <body> + <script> + const tests = [ + { property: 'background-image', imageSet: "url(example.png) 1x", valid: true }, + { property: 'background-image', imageSet: "url('example.png') 1x", valid: true }, + { property: 'background-image', imageSet: "'example.jpg' 1x", valid: true }, + { property: 'background-image', imageSet: "url(example.png) 1x, 'example.png' 2x", valid: true }, + { property: 'background-image', imageSet: "url(example.png) 1dppx", valid: true }, + { property: 'background-image', imageSet: "url(example.png) 1dpi", valid: true }, + { property: 'background-image', imageSet: "url(example.png) 1dpcm, 'example.png' 2x", valid: true }, + { property: 'background-image', imageSet: "'example.jpeg' 222dpi, url(example.png) 3.5x", valid: true }, + { property: 'background-image', imageSet: "linear-gradient(black, white) 1x", valid: true }, + { property: 'content', imageSet: "linear-gradient(black, white) 1x, 'example.png' 4x", valid: true }, + { property: 'content', imageSet: "url('example.png') 192dpi, linear-gradient(black, white) 1x", valid: true }, + + { property: 'background-image', imageSet: "url(example.png) 0x", valid: false }, + { property: 'background-image', imageSet: "url(example.png) -20x", valid: false }, + { property: 'background-image', imageSet: "'example.jpeg' 92pid url(example.png) 1x", valid: false }, + { property: 'cursor', imageSet: "linear-gradient(black, white) 1x", valid: false } + ] + + function check_image_set(tst) { + var div = document.createElement('div'); + div.setAttribute("style", `${tst.property}: image-set(${tst.imageSet})`) + + var inline_style = div.style.getPropertyValue(tst.property); + assert_equals(inline_style.startsWith('image-set'), tst.valid); + + document.body.appendChild(div); + var computed_style = getComputedStyle(div).getPropertyValue(tst.property); + assert_equals(computed_style.startsWith('image-set'), tst.valid); + + div.remove(); + } + + tests.forEach(tst => { + test(() => { + check_image_set(tst); + }, `${tst.property}: image-set(${tst.imageSet}) ${tst.valid ? "[ parsable ]" : "[ unparsable ]"}`) + }); + </script> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/css/css-pseudo/marker-content-021-ref.html b/tests/wpt/web-platform-tests/css/css-pseudo/marker-content-021-ref.html new file mode 100644 index 00000000000..93c0540ca41 --- /dev/null +++ b/tests/wpt/web-platform-tests/css/css-pseudo/marker-content-021-ref.html @@ -0,0 +1,26 @@ +<!DOCTYPE html> +<meta charset="utf-8"> +<title>CSS Reference: ::marker pseudo elements styled with 'content' property</title> +<link rel="author" title="Oriol Brufau" href="mailto:obrufau@igalia.com"> +<style> +::marker { + content: "[m]"; +} +.inside { + list-style-position: inside; +} +</style> +<ol class="inside"> + <li>inside none→symbol</li> + <li>inside symbol→decimal</li> + <li>inside decimal→roman</li> + <li>inside roman→string</li> + <li>inside string→none</li> +</ol> +<ol class="outside"> + <li>outside none→symbol</li> + <li>outside symbol→decimal</li> + <li>outside decimal→roman</li> + <li>outside roman→string</li> + <li>outside string→none</li> +</ol> diff --git a/tests/wpt/web-platform-tests/css/css-pseudo/marker-content-021.html b/tests/wpt/web-platform-tests/css/css-pseudo/marker-content-021.html new file mode 100644 index 00000000000..fc3fe851e97 --- /dev/null +++ b/tests/wpt/web-platform-tests/css/css-pseudo/marker-content-021.html @@ -0,0 +1,66 @@ +<!DOCTYPE html> +<html class="reftest-wait"> +<meta charset="utf-8"> +<title>CSS Test: ::marker pseudo elements styled with 'content' property</title> +<link rel="author" title="Oriol Brufau" href="mailto:obrufau@igalia.com"> +<link rel="match" href="marker-content-021-ref.html"> +<link rel="help" href="https://drafts.csswg.org/css-pseudo-4/#marker-pseudo"> +<link rel="help" href="https://drafts.csswg.org/css-lists/#content-property"> +<meta name="assert" content="Checks that non-normal ::marker is not updated when 'list-style-type' changes dynamically."> +<style> +::marker { + content: "[m]"; +} +.inside { + list-style-position: inside; +} +.none { + list-style-type: none; +} +.symbol { + list-style-type: disc; +} +.decimal { + list-style-type: decimal; +} +.roman { + list-style-type: lower-roman; +} +.string { + list-style-type: "string"; +} +</style> +<ol class="inside"> + <li class="none">inside none→symbol</li> + <li class="symbol">inside symbol→decimal</li> + <li class="decimal">inside decimal→roman</li> + <li class="roman">inside roman→string</li> + <li class="string">inside string→none</li> +</ol> +<ol class="outside"> + <li class="none">outside none→symbol</li> + <li class="symbol">outside symbol→decimal</li> + <li class="decimal">outside decimal→roman</li> + <li class="roman">outside roman→string</li> + <li class="string">outside string→none</li> +</ol> +<script src="/common/reftest-wait.js"></script> +<script> +"use strict"; +// Use a "load" event listener and requestAnimationFrame to ensure that +// the markers will have been laid out. +addEventListener("load", function() { + requestAnimationFrame(() => { + for (let list of document.querySelectorAll("ol")) { + // Rotate class names among list items + const firstClass = list.firstElementChild.className; + for (let item of list.children) { + const next = item.nextElementSibling; + item.className = next ? next.className : firstClass; + } + } + takeScreenshot(); + }); +}, {once: true}); +</script> +</html> diff --git a/tests/wpt/web-platform-tests/css/css-sizing/ortho-writing-mode-001.html b/tests/wpt/web-platform-tests/css/css-sizing/ortho-writing-mode-001.html new file mode 100644 index 00000000000..9342802645f --- /dev/null +++ b/tests/wpt/web-platform-tests/css/css-sizing/ortho-writing-mode-001.html @@ -0,0 +1,16 @@ +<!DOCTYPE html> +<link rel="author" title="David Grogan" href="mailto:dgrogan@chromium.org"> +<link rel="author" title="Morten Stenshorne" href="mailto:mstensho@chromium.org"> +<link rel="help" href="https://drafts.csswg.org/css-sizing-3/#intrinsic-sizes" title="first paragraph"> +<link rel="help" href="https://www.w3.org/TR/css-writing-modes-4/#orthogonal-auto"> +<link rel="match" href="../reference/ref-filled-green-100px-square.xht"> +<meta name="flags" content="" /> +<meta name="assert" content="The intrinsic size of an orthogonal child is its shrink to fit size after layout" /> + +<p>Test passes if there is a filled green square and <strong>no red</strong>.</p> + +<div style="width:min-content; background:red;"> + <div style="writing-mode:vertical-rl; background:green;"> + <div style="margin-right:50%; width:50px; height:100px;"></div> + </div> +</div> diff --git a/tests/wpt/web-platform-tests/document-policy/font-display/font-display-document-policy-01.tentative-ref.html b/tests/wpt/web-platform-tests/document-policy/font-display/font-display-document-policy-01.tentative-ref.html new file mode 100644 index 00000000000..78bca05b124 --- /dev/null +++ b/tests/wpt/web-platform-tests/document-policy/font-display/font-display-document-policy-01.tentative-ref.html @@ -0,0 +1,30 @@ +<!DOCTYPE html> +<title>Test for no-font-display-late-swap document policy behavior</title> +<link rel="stylesheet" type="text/css" href="/fonts/ahem.css" /> +<style> +.ahem { + font-family: 'Ahem'; +} +.arial { + font-family: 'Arial'; +} +</style> +<p>Tests if font-display is set to optional for each option except for when it is set to fallback</p> +<table id="container"> + <tr> + <th>not-set</th> + <th>auto</th> + <th>block</th> + <th>swap</th> + <th>fallback</th> + <th>optional</th> + </tr> + <tr> + <td class="arial">a</td> + <td class="arial">a</td> + <td class="arial">a</td> + <td class="arial">a</td> + <td class="ahem">a</td> + <td class="arial">a</td> + </tr> +</table> diff --git a/tests/wpt/web-platform-tests/document-policy/font-display/font-display-document-policy-01.tentative.html b/tests/wpt/web-platform-tests/document-policy/font-display/font-display-document-policy-01.tentative.html new file mode 100644 index 00000000000..cad4c18015c --- /dev/null +++ b/tests/wpt/web-platform-tests/document-policy/font-display/font-display-document-policy-01.tentative.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<html class="reftest-wait"> +<title>Test for no-font-display-late-swap document policy behavior</title> +<link rel="help" href="https://github.com/w3c/webappsec-feature-policy/blob/master/policies/font-display-late-swap.md"> +<link rel="match" href="font-display-document-policy-01.tentative-ref.html"> +<style> +</style> +<p>Tests if font-display is set to optional for each option except for when it is set to fallback</p> +<table id="container"> + <tr> + <th>not-set</th> + <th>auto</th> + <th>block</th> + <th>swap</th> + <th>fallback</th> + <th>optional</th> + </tr> +</table> +<script> +const fontDisplayValues = ['', 'auto', 'block', 'swap', 'fallback', 'optional']; +const table = document.getElementById('container'); + +function makeFontFaceDeclaration(family, display) { + url = '/fonts/Ahem.ttf?pipe=trickle(d1)'; // Before the swap period is over + return '@font-face { font-family: ' + family + '; src: url("' + url + '"); font-display: ' + display + '; }'; +} + +window.onload = () => { + let tr = document.createElement('tr'); + for (let display of fontDisplayValues) { + const family = display + '-face'; + const rule = makeFontFaceDeclaration(family, display); + document.styleSheets[0].insertRule(rule, 0); + let td = document.createElement('td'); + td.textContent = 'a'; + td.style.fontFamily = family + ', Arial'; + tr.appendChild(td); + } + table.appendChild(tr); + const timeoutMilliSec = 1500; // After the font is loaded + setTimeout(() => { + document.documentElement.classList.remove("reftest-wait"); + }, timeoutMilliSec); +} +</script> +</html> diff --git a/tests/wpt/web-platform-tests/document-policy/font-display/font-display-document-policy-01.tentative.html.headers b/tests/wpt/web-platform-tests/document-policy/font-display/font-display-document-policy-01.tentative.html.headers new file mode 100644 index 00000000000..e1387f50dee --- /dev/null +++ b/tests/wpt/web-platform-tests/document-policy/font-display/font-display-document-policy-01.tentative.html.headers @@ -0,0 +1 @@ +Document-Policy: no-font-display-late-swap diff --git a/tests/wpt/web-platform-tests/dom/events/webkit-animation-iteration-event.html b/tests/wpt/web-platform-tests/dom/events/webkit-animation-iteration-event.html index e6e7ec14590..fb251972a32 100644 --- a/tests/wpt/web-platform-tests/dom/events/webkit-animation-iteration-event.html +++ b/tests/wpt/web-platform-tests/dom/events/webkit-animation-iteration-event.html @@ -15,6 +15,9 @@ runAnimationEventTests({ unprefixedType: 'animationiteration', prefixedType: 'webkitAnimationIteration', - animationCssStyle: '50ms 2', + // Use a long duration to avoid missing the animation due to slow machines, + // but set a negative delay so that the iteration boundary happens shortly + // after the animation starts. + animationCssStyle: '100s -99.9s 2', }); </script> diff --git a/tests/wpt/web-platform-tests/domparsing/DOMParser-parseFromString-encoding.html b/tests/wpt/web-platform-tests/domparsing/DOMParser-parseFromString-encoding.html new file mode 100644 index 00000000000..ab1e969530d --- /dev/null +++ b/tests/wpt/web-platform-tests/domparsing/DOMParser-parseFromString-encoding.html @@ -0,0 +1,47 @@ +<!doctype html> +<title>DOMParser encoding test</title> +<meta charset="windows-1252"> <!-- intentional to make sure the results are UTF-8 anyway --> +<script src="/resources/testharness.js"></script> +<script src="/resources/testharnessreport.js"></script> + +<script> +"use strict"; + +function assertEncoding(doc) { + assert_equals(doc.charset, "UTF-8", "document.charset"); + assert_equals(doc.characterSet, "UTF-8", "document.characterSet"); + assert_equals(doc.inputEncoding, "UTF-8", "document.characterSet"); +} + +setup(() => { + assert_precondition(document.characterSet === "windows-1252", "the meta charset must be in effect, making the main document windows-1252"); +}); + +test(() => { + const parser = new DOMParser(); + const doc = parser.parseFromString("", "text/html"); + + assertEncoding(doc); +}, "HTML: empty"); + +test(() => { + const parser = new DOMParser(); + const doc = parser.parseFromString("", "text/xml"); + + assertEncoding(doc); +}, "XML: empty"); + +test(() => { + const parser = new DOMParser(); + const doc = parser.parseFromString(`<meta charset="latin2">`, "text/html"); + + assertEncoding(doc); +}, "HTML: meta charset"); + +test(() => { + const parser = new DOMParser(); + const doc = parser.parseFromString(`<?xml version="1.0" encoding="latin2"?><x/>`, "text/xml"); + + assertEncoding(doc); +}, "XML: XML declaration"); +</script> diff --git a/tests/wpt/web-platform-tests/domparsing/DOMParser-parseFromString-html.html b/tests/wpt/web-platform-tests/domparsing/DOMParser-parseFromString-html.html index 5e1dd1291de..86e516d6180 100644 --- a/tests/wpt/web-platform-tests/domparsing/DOMParser-parseFromString-html.html +++ b/tests/wpt/web-platform-tests/domparsing/DOMParser-parseFromString-html.html @@ -6,11 +6,9 @@ // |expected| should be an object indicating the expected type of node. function assert_node(actual, expected) { assert_true(actual instanceof expected.type, - 'Node type mismatch: actual = ' + actual.nodeType + ', expected = ' + expected.nodeType); + 'Node type mismatch: actual = ' + actual.constructor.name + ', expected = ' + expected.type.name); if (typeof(expected.id) !== 'undefined') assert_equals(actual.id, expected.id, expected.idMessage); - if (typeof(expected.nodeValue) !== 'undefined') - assert_equals(actual.nodeValue, expected.nodeValue, expected.nodeValueMessage); } var doc; @@ -31,28 +29,17 @@ test(function() { }, 'contentType'); test(function() { - assert_equals(doc.characterSet, "UTF-8") -}, 'characterSet'); + assert_equals(doc.compatMode, "BackCompat") +}, 'compatMode'); test(function() { - assert_equals(doc.inputEncoding, "UTF-8") -}, 'inputEncoding'); - -test(function() { - assert_equals(doc.charset, "UTF-8") -}, 'charset'); - -test(function() { - var url = document.URL; - assert_equals(doc.documentURI, url, - 'The document must have a URL value equal to the URL of the active document.'); - assert_equals(doc.URL, url, - 'The document must have a URL value equal to the URL of the active document.'); -}, 'URL value'); + var parser = new DOMParser(); + var input = '<!DOCTYPE html><html id="root"><head></head><body></body></html>'; + doc = parser.parseFromString(input, 'text/html'); + assert_equals(doc.compatMode, "CSS1Compat") +}, 'compatMode for a proper DOCTYPE'); -test(function() { - assert_equals(doc.baseURI, document.URL); -}, 'baseURI value'); +// URL- and encoding-related stuff tested separately. test(function() { assert_equals(doc.location, null, @@ -83,10 +70,17 @@ test(() => { <style> @import url(/dummy.css) </style> -<script>x = 8<\/script> +<script>document.x = 8<\/script> </body></html>`, 'text/html'); assert_not_equals(doc.querySelector('script'), null, 'script must be found'); - assert_equals(doc.x, undefined, 'script must not be executed'); + assert_equals(doc.x, undefined, 'script must not be executed on the inner document'); + assert_equals(document.x, undefined, 'script must not be executed on the outer document'); }, 'script is found synchronously even when there is a css import'); + +test(() => { + const doc = new DOMParser().parseFromString(`<body><noscript><p id="test1">test1<p id="test2">test2</noscript>`, 'text/html'); + assert_node(doc.body.firstChild.childNodes[0], { type: HTMLParagraphElement, id: 'test1' }); + assert_node(doc.body.firstChild.childNodes[1], { type: HTMLParagraphElement, id: 'test2' }); +}, 'must be parsed with scripting disabled, so noscript works'); </script> diff --git a/tests/wpt/web-platform-tests/domparsing/DOMParser-parseFromString-url-base-pushstate.html b/tests/wpt/web-platform-tests/domparsing/DOMParser-parseFromString-url-base-pushstate.html new file mode 100644 index 00000000000..41d7344a64d --- /dev/null +++ b/tests/wpt/web-platform-tests/domparsing/DOMParser-parseFromString-url-base-pushstate.html @@ -0,0 +1,13 @@ +<!doctype html> +<title>DOMParser test of how the document's URL is set (base, pushstate)</title> +<base href="/fake/base-from-outer-frame"> +<script src="/resources/testharness.js"></script> +<script src="/resources/testharnessreport.js"></script> + +<iframe src="/domparsing/resources/domparser-iframe-base-pushstate.html" onload="window.resolveLoadPromise();"></iframe> + +<script> +"use strict"; +history.pushState(null, "", "/fake/push-state-from-outer-frame"); +</script> +<script src="/domparsing/resources/domparser-url-tests.js"></script> diff --git a/tests/wpt/web-platform-tests/domparsing/DOMParser-parseFromString-url-base.html b/tests/wpt/web-platform-tests/domparsing/DOMParser-parseFromString-url-base.html new file mode 100644 index 00000000000..5af1cee1c57 --- /dev/null +++ b/tests/wpt/web-platform-tests/domparsing/DOMParser-parseFromString-url-base.html @@ -0,0 +1,8 @@ +<!doctype html> +<title>DOMParser test of how the document's URL is set (base, no pushstate)</title> +<base href="/fake/base-from-outer-frame"> +<script src="/resources/testharness.js"></script> +<script src="/resources/testharnessreport.js"></script> + +<iframe src="/domparsing/resources/domparser-iframe-base.html" onload="window.resolveLoadPromise();"></iframe> +<script src="/domparsing/resources/domparser-url-tests.js"></script> diff --git a/tests/wpt/web-platform-tests/domparsing/DOMParser-parseFromString-url-pushstate.html b/tests/wpt/web-platform-tests/domparsing/DOMParser-parseFromString-url-pushstate.html new file mode 100644 index 00000000000..ecb89bc7412 --- /dev/null +++ b/tests/wpt/web-platform-tests/domparsing/DOMParser-parseFromString-url-pushstate.html @@ -0,0 +1,12 @@ +<!doctype html> +<title>DOMParser test of how the document's URL is set (no base, pushstate)</title> +<script src="/resources/testharness.js"></script> +<script src="/resources/testharnessreport.js"></script> + +<iframe src="/domparsing/resources/domparser-iframe-pushstate.html" onload="window.resolveLoadPromise();"></iframe> + +<script> +"use strict"; +history.pushState(null, "", "/fake/push-state-from-outer-frame"); +</script> +<script src="/domparsing/resources/domparser-url-tests.js"></script> diff --git a/tests/wpt/web-platform-tests/domparsing/DOMParser-parseFromString-url.html b/tests/wpt/web-platform-tests/domparsing/DOMParser-parseFromString-url.html new file mode 100644 index 00000000000..9b9a672c48b --- /dev/null +++ b/tests/wpt/web-platform-tests/domparsing/DOMParser-parseFromString-url.html @@ -0,0 +1,7 @@ +<!doctype html> +<title>DOMParser test of how the document's URL is set (no pushstate, no base)</title> +<script src="/resources/testharness.js"></script> +<script src="/resources/testharnessreport.js"></script> + +<iframe src="/domparsing/resources/domparser-iframe.html" onload="window.resolveLoadPromise();"></iframe> +<script src="/domparsing/resources/domparser-url-tests.js"></script> diff --git a/tests/wpt/web-platform-tests/domparsing/DOMParser-parseFromString-xml-parsererror.html b/tests/wpt/web-platform-tests/domparsing/DOMParser-parseFromString-xml-parsererror.html index 9ecd0edd1e7..f6985aa20a3 100644 --- a/tests/wpt/web-platform-tests/domparsing/DOMParser-parseFromString-xml-parsererror.html +++ b/tests/wpt/web-platform-tests/domparsing/DOMParser-parseFromString-xml-parsererror.html @@ -35,4 +35,16 @@ const xhtml_prologue = '<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" assert_equals(parsererrors.length, 1, 'expecting one parsererror'); }, document.title + ', ' + fragment); }); + +[ + 'text/xml', + 'application/xml', + 'application/xhtml+xml', + 'image/svg+xml' +].forEach(mimeType => { + test(() => { + const doc = (new DOMParser()).parseFromString('<span x:test="testing">1</span>', mimeType); + assert_equals(doc.contentType, mimeType); + }, `${mimeType} is preserved in the error document`); +}) </script> diff --git a/tests/wpt/web-platform-tests/domparsing/DOMParser-parseFromString-xml.html b/tests/wpt/web-platform-tests/domparsing/DOMParser-parseFromString-xml.html index c639c239dd4..b07bb3d87c8 100644 --- a/tests/wpt/web-platform-tests/domparsing/DOMParser-parseFromString-xml.html +++ b/tests/wpt/web-platform-tests/domparsing/DOMParser-parseFromString-xml.html @@ -50,5 +50,28 @@ allowedTypes.forEach(function(type) { var doc = p.parseFromString("<foo>", type); assert_false(doc instanceof XMLDocument, "Should not be XMLDocument"); }, "XMLDocument interface for incorrectly parsed document with type " + type); + + test(function() { + var p = new DOMParser(); + var doc = p.parseFromString(` + <html> + <head></head> + <body> + <script>document.x = 5;<\/script> + <noscript><p>test1</p><p>test2</p></noscript> + </body> + </html>` + , type); + + assert_equals(doc.x, undefined, "script must not be executed on the inner document"); + assert_equals(document.x, undefined, "script must not be executed on the outer document"); + + const body = doc.documentElement.children[1]; + assert_equals(body.localName, "body"); + assert_equals(body.children[1].localName, "noscript"); + assert_equals(body.children[1].children.length, 2); + assert_equals(body.children[1].children[0].localName, "p"); + assert_equals(body.children[1].children[1].localName, "p"); + }, "scripting must be disabled with type " + type); }); </script> diff --git a/tests/wpt/web-platform-tests/domparsing/resources/domparser-iframe-base-pushstate.html b/tests/wpt/web-platform-tests/domparsing/resources/domparser-iframe-base-pushstate.html new file mode 100644 index 00000000000..9c4a1bd07ac --- /dev/null +++ b/tests/wpt/web-platform-tests/domparsing/resources/domparser-iframe-base-pushstate.html @@ -0,0 +1,10 @@ +<!DOCTYPE html> +<meta charset="utf-8"> +<title>An iframe that does DOMParser stuff with base and pushstates itself</title> +<base href="/fake/base-from-iframe"> + +<script> +"use strict"; +history.pushState(null, "", "/fake/push-state-from-iframe"); +</script> +<script src="/domparsing/resources/domparser-iframe.js"></script> diff --git a/tests/wpt/web-platform-tests/domparsing/resources/domparser-iframe-base.html b/tests/wpt/web-platform-tests/domparsing/resources/domparser-iframe-base.html new file mode 100644 index 00000000000..e8a084b7dce --- /dev/null +++ b/tests/wpt/web-platform-tests/domparsing/resources/domparser-iframe-base.html @@ -0,0 +1,6 @@ +<!DOCTYPE html> +<meta charset="utf-8"> +<title>An iframe that does DOMParser stuff with base</title> +<base href="/fake/base-from-iframe"> + +<script src="/domparsing/resources/domparser-iframe.js"></script> diff --git a/tests/wpt/web-platform-tests/domparsing/resources/domparser-iframe-pushstate.html b/tests/wpt/web-platform-tests/domparsing/resources/domparser-iframe-pushstate.html new file mode 100644 index 00000000000..b2821c69940 --- /dev/null +++ b/tests/wpt/web-platform-tests/domparsing/resources/domparser-iframe-pushstate.html @@ -0,0 +1,9 @@ +<!DOCTYPE html> +<meta charset="utf-8"> +<title>An iframe that does DOMParser stuff and pushstates itself</title> + +<script> +"use strict"; +history.pushState(null, "", "/fake/push-state-from-iframe"); +</script> +<script src="/domparsing/resources/domparser-iframe.js"></script> diff --git a/tests/wpt/web-platform-tests/domparsing/resources/domparser-iframe.html b/tests/wpt/web-platform-tests/domparsing/resources/domparser-iframe.html new file mode 100644 index 00000000000..710f141bb9e --- /dev/null +++ b/tests/wpt/web-platform-tests/domparsing/resources/domparser-iframe.html @@ -0,0 +1,4 @@ +<!DOCTYPE html> +<meta charset="utf-8"> +<title>An iframe that does DOMParser stuff</title> +<script src="/domparsing/resources/domparser-iframe.js"></script> diff --git a/tests/wpt/web-platform-tests/domparsing/resources/domparser-iframe.js b/tests/wpt/web-platform-tests/domparsing/resources/domparser-iframe.js new file mode 100644 index 00000000000..a62d2f293b3 --- /dev/null +++ b/tests/wpt/web-platform-tests/domparsing/resources/domparser-iframe.js @@ -0,0 +1,4 @@ +window.doParse = (html, mimeType) => { + const parser = new DOMParser(); + return parser.parseFromString(html, mimeType); +}; diff --git a/tests/wpt/web-platform-tests/domparsing/resources/domparser-url-tests.js b/tests/wpt/web-platform-tests/domparsing/resources/domparser-url-tests.js new file mode 100644 index 00000000000..7b02fab1c30 --- /dev/null +++ b/tests/wpt/web-platform-tests/domparsing/resources/domparser-url-tests.js @@ -0,0 +1,72 @@ +const loadPromise = new Promise(resolve => { window.resolveLoadPromise = resolve; }); + +function assertURL(doc, expectedURL) { + assert_equals(doc.URL, expectedURL, "document.URL"); + assert_equals(doc.documentURI, expectedURL, "document.documentURI"); + assert_equals(doc.baseURI, expectedURL, "document.baseURI"); +} + +const supportedTypes = [ + "text/html", + "text/xml", + "application/xml", + "application/xhtml+xml", + "image/svg+xml", +]; + +const invalidXML = `<span x:test="testing">1</span>`; +const inputs = { + valid: "<html></html>", + "invalid XML": invalidXML +}; + +for (const mimeType of supportedTypes) { + for (const [inputName, input] of Object.entries(inputs)) { + if (mimeType === "text/html" && input === invalidXML) { + continue; + } + + test(() => { + const parser = new DOMParser(); + const doc = parser.parseFromString(input, mimeType); + + assertURL(doc, document.URL); + }, `${mimeType} ${inputName}: created normally`); + + promise_test(async () => { + await loadPromise; + + const parser = new frames[0].DOMParser(); + const doc = parser.parseFromString(input, mimeType); + + assertURL(doc, frames[0].document.URL); + }, `${mimeType} ${inputName}: created using another iframe's DOMParser from this frame`); + + promise_test(async () => { + await loadPromise; + + const parser = new frames[0].DOMParser(); + const doc = frames[0].doParse(input, mimeType); + + assertURL(doc, frames[0].document.URL); + }, `${mimeType} ${inputName}: created using another iframe's DOMParser from that frame`); + + promise_test(async () => { + await loadPromise; + + const parser = new DOMParser(); + const doc = frames[0].DOMParser.prototype.parseFromString.call(parser, input, mimeType); + + assertURL(doc, document.URL); + }, `${mimeType} ${inputName}: created using a parser from this frame and the method from the iframe`); + + promise_test(async () => { + await loadPromise; + + const parser = new frames[0].DOMParser(); + const doc = DOMParser.prototype.parseFromString.call(parser, input, mimeType); + + assertURL(doc, frames[0].document.URL); + }, `${mimeType} ${inputName}: created using a parser from the iframe and the method from this frame`); + } +} diff --git a/tests/wpt/web-platform-tests/html/semantics/scripting-1/the-script-element/execution-timing/106-defer-import.html b/tests/wpt/web-platform-tests/html/semantics/scripting-1/the-script-element/execution-timing/106-defer-import.html new file mode 100644 index 00000000000..451e218ef74 --- /dev/null +++ b/tests/wpt/web-platform-tests/html/semantics/scripting-1/the-script-element/execution-timing/106-defer-import.html @@ -0,0 +1,14 @@ +<!DOCTYPE html> +<html><head> + <title> scheduler: stylesheets blocking defer scripts</title> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <!-- this stylesheet blocks scripts --> + <link rel="stylesheet" href="css/import.css?pipe=trickle(d2)"> +</head> +<body> + <div id="log">FAILED (This TC requires JavaScript enabled)</div> + <div id="test">Test</div> + + <script defer src="scripts/check-style-sheet.js"></script> +</body></html> diff --git a/tests/wpt/web-platform-tests/html/semantics/scripting-1/the-script-element/execution-timing/106-defer-noimport.html b/tests/wpt/web-platform-tests/html/semantics/scripting-1/the-script-element/execution-timing/106-defer-noimport.html new file mode 100644 index 00000000000..704b880bcfb --- /dev/null +++ b/tests/wpt/web-platform-tests/html/semantics/scripting-1/the-script-element/execution-timing/106-defer-noimport.html @@ -0,0 +1,14 @@ +<!DOCTYPE html> +<html><head> + <title> scheduler: stylesheets blocking defer scripts</title> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <!-- this stylesheet blocks scripts --> + <link rel="stylesheet" href="css/background.css?pipe=trickle(d2)"> +</head> +<body> + <div id="log">FAILED (This TC requires JavaScript enabled)</div> + <div id="test">Test</div> + + <script defer src="scripts/check-style-sheet.js"></script> +</body></html> diff --git a/tests/wpt/web-platform-tests/html/semantics/scripting-1/the-script-element/execution-timing/106-external-import.html b/tests/wpt/web-platform-tests/html/semantics/scripting-1/the-script-element/execution-timing/106-external-import.html new file mode 100644 index 00000000000..4fe526a2744 --- /dev/null +++ b/tests/wpt/web-platform-tests/html/semantics/scripting-1/the-script-element/execution-timing/106-external-import.html @@ -0,0 +1,14 @@ +<!DOCTYPE html> +<html><head> + <title> scheduler: stylesheets blocking external parser-blocking scripts</title> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <!-- this stylesheet blocks scripts --> + <link rel="stylesheet" href="css/import.css?pipe=trickle(d2)"> +</head> +<body> + <div id="log">FAILED (This TC requires JavaScript enabled)</div> + <div id="test">Test</div> + + <script src="scripts/check-style-sheet.js"></script> +</body></html> diff --git a/tests/wpt/web-platform-tests/html/semantics/scripting-1/the-script-element/execution-timing/106-external-module-import.html b/tests/wpt/web-platform-tests/html/semantics/scripting-1/the-script-element/execution-timing/106-external-module-import.html new file mode 100644 index 00000000000..ea873746e0c --- /dev/null +++ b/tests/wpt/web-platform-tests/html/semantics/scripting-1/the-script-element/execution-timing/106-external-module-import.html @@ -0,0 +1,14 @@ +<!DOCTYPE html> +<html><head> + <title> scheduler: stylesheets blocking external module scripts</title> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <!-- this stylesheet blocks scripts --> + <link rel="stylesheet" href="css/import.css?pipe=trickle(d2)"> +</head> +<body> + <div id="log">FAILED (This TC requires JavaScript enabled)</div> + <div id="test">Test</div> + + <script src="scripts/check-style-sheet.js" type="module"></script> +</body></html> diff --git a/tests/wpt/web-platform-tests/html/semantics/scripting-1/the-script-element/execution-timing/106-external-module-noimport.html b/tests/wpt/web-platform-tests/html/semantics/scripting-1/the-script-element/execution-timing/106-external-module-noimport.html new file mode 100644 index 00000000000..71c59fb4d60 --- /dev/null +++ b/tests/wpt/web-platform-tests/html/semantics/scripting-1/the-script-element/execution-timing/106-external-module-noimport.html @@ -0,0 +1,14 @@ +<!DOCTYPE html> +<html><head> + <title> scheduler: stylesheets blocking external module scripts</title> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <!-- this stylesheet blocks scripts --> + <link rel="stylesheet" href="css/background.css?pipe=trickle(d2)"> +</head> +<body> + <div id="log">FAILED (This TC requires JavaScript enabled)</div> + <div id="test">Test</div> + + <script src="scripts/check-style-sheet.js" type="module"></script> +</body></html> diff --git a/tests/wpt/web-platform-tests/html/semantics/scripting-1/the-script-element/execution-timing/106-external-noimport.html b/tests/wpt/web-platform-tests/html/semantics/scripting-1/the-script-element/execution-timing/106-external-noimport.html new file mode 100644 index 00000000000..3694481b86a --- /dev/null +++ b/tests/wpt/web-platform-tests/html/semantics/scripting-1/the-script-element/execution-timing/106-external-noimport.html @@ -0,0 +1,14 @@ +<!DOCTYPE html> +<html><head> + <title> scheduler: stylesheets blocking external parser-blocking scripts</title> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <!-- this stylesheet blocks scripts --> + <link rel="stylesheet" href="css/background.css?pipe=trickle(d2)"> +</head> +<body> + <div id="log">FAILED (This TC requires JavaScript enabled)</div> + <div id="test">Test</div> + + <script src="scripts/check-style-sheet.js"></script> +</body></html> diff --git a/tests/wpt/web-platform-tests/html/semantics/scripting-1/the-script-element/execution-timing/106-import.html b/tests/wpt/web-platform-tests/html/semantics/scripting-1/the-script-element/execution-timing/106-import.html index db7abcc88de..b8afeda1357 100644 --- a/tests/wpt/web-platform-tests/html/semantics/scripting-1/the-script-element/execution-timing/106-import.html +++ b/tests/wpt/web-platform-tests/html/semantics/scripting-1/the-script-element/execution-timing/106-import.html @@ -3,7 +3,6 @@ <title> scheduler: stylesheets blocking scripts</title> <script src="/resources/testharness.js"></script> <script src="/resources/testharnessreport.js"></script> - <script src="testlib/testlib.js"></script> <!-- this stylesheet blocks scripts --> <link rel="stylesheet" href="css/import.css?pipe=trickle(d2)"> </head> diff --git a/tests/wpt/web-platform-tests/html/semantics/scripting-1/the-script-element/execution-timing/106-module-import.html b/tests/wpt/web-platform-tests/html/semantics/scripting-1/the-script-element/execution-timing/106-module-import.html new file mode 100644 index 00000000000..d3f02ffd19c --- /dev/null +++ b/tests/wpt/web-platform-tests/html/semantics/scripting-1/the-script-element/execution-timing/106-module-import.html @@ -0,0 +1,19 @@ +<!DOCTYPE html> +<html><head> + <title> scheduler: stylesheets blocking module scripts</title> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <!-- this stylesheet blocks scripts --> + <link rel="stylesheet" href="css/import.css?pipe=trickle(d2)"> +</head> +<body> + <div id="log">FAILED (This TC requires JavaScript enabled)</div> + <div id="test">Test</div> + + <script type="module"> + test(function() { + assert_equals(getComputedStyle(document.getElementById("test")).position, + "fixed"); + }); + </script> +</body></html> diff --git a/tests/wpt/web-platform-tests/html/semantics/scripting-1/the-script-element/execution-timing/106-module-noimport.html b/tests/wpt/web-platform-tests/html/semantics/scripting-1/the-script-element/execution-timing/106-module-noimport.html new file mode 100644 index 00000000000..83cd29f2674 --- /dev/null +++ b/tests/wpt/web-platform-tests/html/semantics/scripting-1/the-script-element/execution-timing/106-module-noimport.html @@ -0,0 +1,19 @@ +<!DOCTYPE html> +<html><head> + <title> scheduler: stylesheets blocking module scripts</title> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <!-- this stylesheet blocks scripts --> + <link rel="stylesheet" href="css/background.css?pipe=trickle(d2)"> +</head> +<body> + <div id="log">FAILED (This TC requires JavaScript enabled)</div> + <div id="test">Test</div> + + <script type="module"> + test(function() { + assert_equals(getComputedStyle(document.getElementById("test")).position, + "fixed"); + }); + </script> +</body></html> diff --git a/tests/wpt/web-platform-tests/html/semantics/scripting-1/the-script-element/execution-timing/106-noimport.html b/tests/wpt/web-platform-tests/html/semantics/scripting-1/the-script-element/execution-timing/106-noimport.html index 8e099c58023..bd8ec8633e4 100644 --- a/tests/wpt/web-platform-tests/html/semantics/scripting-1/the-script-element/execution-timing/106-noimport.html +++ b/tests/wpt/web-platform-tests/html/semantics/scripting-1/the-script-element/execution-timing/106-noimport.html @@ -3,7 +3,6 @@ <title> scheduler: stylesheets blocking scripts</title> <script src="/resources/testharness.js"></script> <script src="/resources/testharnessreport.js"></script> - <script src="testlib/testlib.js"></script> <!-- this stylesheet blocks scripts --> <link rel="stylesheet" href="css/background.css?pipe=trickle(d2)"> </head> diff --git a/tests/wpt/web-platform-tests/html/semantics/scripting-1/the-script-element/execution-timing/scripts/check-style-sheet.js b/tests/wpt/web-platform-tests/html/semantics/scripting-1/the-script-element/execution-timing/scripts/check-style-sheet.js new file mode 100644 index 00000000000..cbab154f5ae --- /dev/null +++ b/tests/wpt/web-platform-tests/html/semantics/scripting-1/the-script-element/execution-timing/scripts/check-style-sheet.js @@ -0,0 +1,4 @@ +test(function() { + assert_equals(getComputedStyle(document.getElementById("test")).position, + "fixed"); +}); diff --git a/tests/wpt/web-platform-tests/interfaces/IndexedDB.idl b/tests/wpt/web-platform-tests/interfaces/IndexedDB.idl index a66a245466e..8af2bbcf238 100644 --- a/tests/wpt/web-platform-tests/interfaces/IndexedDB.idl +++ b/tests/wpt/web-platform-tests/interfaces/IndexedDB.idl @@ -205,6 +205,7 @@ interface IDBCursorWithValue : IDBCursor { interface IDBTransaction : EventTarget { readonly attribute DOMStringList objectStoreNames; readonly attribute IDBTransactionMode mode; + readonly attribute IDBTransactionDurability durability; [SameObject] readonly attribute IDBDatabase db; readonly attribute DOMException? error; diff --git a/tests/wpt/web-platform-tests/interfaces/SVG.idl b/tests/wpt/web-platform-tests/interfaces/SVG.idl index 63367fdc23e..16a9b7e295d 100644 --- a/tests/wpt/web-platform-tests/interfaces/SVG.idl +++ b/tests/wpt/web-platform-tests/interfaces/SVG.idl @@ -1,7 +1,7 @@ // GENERATED CONTENT - DO NOT EDIT // Content was automatically extracted by Reffy into reffy-reports // (https://github.com/tidoust/reffy-reports) -// Source: Scalable Vector Graphics (SVG) 2 (https://svgwg.org/svg2-draft/) +// Source: Scalable Vector Graphics (SVG) 2 (https://svgwg.org/svg2-draft/single-page.html) [Exposed=Window] interface SVGElement : Element { diff --git a/tests/wpt/web-platform-tests/interfaces/WebCryptoAPI.idl b/tests/wpt/web-platform-tests/interfaces/WebCryptoAPI.idl index fecb3b72d3a..d81a43ba0f9 100644 --- a/tests/wpt/web-platform-tests/interfaces/WebCryptoAPI.idl +++ b/tests/wpt/web-platform-tests/interfaces/WebCryptoAPI.idl @@ -1,7 +1,7 @@ // GENERATED CONTENT - DO NOT EDIT // Content was automatically extracted by Reffy into reffy-reports // (https://github.com/tidoust/reffy-reports) -// Source: Web Cryptography API (https://w3c.github.io/webcrypto/Overview.html) +// Source: Web Cryptography API (http://w3c.github.io/webcrypto/) partial interface mixin WindowOrWorkerGlobalScope { [SameObject] readonly attribute Crypto crypto; diff --git a/tests/wpt/web-platform-tests/interfaces/geolocation-sensor.idl b/tests/wpt/web-platform-tests/interfaces/geolocation-sensor.idl index 0083cdac198..ef172f63ea0 100644 --- a/tests/wpt/web-platform-tests/interfaces/geolocation-sensor.idl +++ b/tests/wpt/web-platform-tests/interfaces/geolocation-sensor.idl @@ -1,7 +1,7 @@ // GENERATED CONTENT - DO NOT EDIT // Content was automatically extracted by Reffy into reffy-reports // (https://github.com/tidoust/reffy-reports) -// Source: Geolocation Sensor (https://wicg.github.io/geolocation-sensor/) +// Source: Geolocation Sensor (https://w3c.github.io/geolocation-sensor/) [Constructor(optional GeolocationSensorOptions options = {}), SecureContext, diff --git a/tests/wpt/web-platform-tests/interfaces/intersection-observer.idl b/tests/wpt/web-platform-tests/interfaces/intersection-observer.idl index ffda8f5c64d..133622e508c 100644 --- a/tests/wpt/web-platform-tests/interfaces/intersection-observer.idl +++ b/tests/wpt/web-platform-tests/interfaces/intersection-observer.idl @@ -8,7 +8,7 @@ callback IntersectionObserverCallback = void (sequence<IntersectionObserverEntry [Constructor(IntersectionObserverCallback callback, optional IntersectionObserverInit options), Exposed=Window] interface IntersectionObserver { - readonly attribute Element? root; + readonly attribute Node? root; readonly attribute DOMString rootMargin; readonly attribute FrozenArray<double> thresholds; void observe(Element target); @@ -39,7 +39,7 @@ dictionary IntersectionObserverEntryInit { }; dictionary IntersectionObserverInit { - Element? root = null; + (Element or Document)? root = null; DOMString rootMargin = "0px"; (double or sequence<double>) threshold = 0; }; diff --git a/tests/wpt/web-platform-tests/lint.whitelist b/tests/wpt/web-platform-tests/lint.whitelist index e428d2f4f19..48206424a56 100644 --- a/tests/wpt/web-platform-tests/lint.whitelist +++ b/tests/wpt/web-platform-tests/lint.whitelist @@ -293,6 +293,7 @@ SET TIMEOUT: css/css-fonts/font-display/font-display-change-ref.html SET TIMEOUT: css/css-fonts/font-display/font-display-feature-policy-01.tentative.html SET TIMEOUT: css/css-fonts/font-display/font-display-feature-policy-02.tentative.html SET TIMEOUT: css/css-fonts/font-display/font-display-preload.html +SET TIMEOUT: document-policy/font-display/font-display-document-policy-01.tentative.html SET TIMEOUT: html/browsers/windows/auxiliary-browsing-contexts/resources/close-opener.html SET TIMEOUT: html/cross-origin-embedder-policy/resources/navigate-none.sub.html SET TIMEOUT: html/cross-origin-embedder-policy/resources/navigate-require-corp.sub.html diff --git a/tests/wpt/web-platform-tests/paint-timing/first-image-child.html b/tests/wpt/web-platform-tests/paint-timing/first-image-child.html index 9851800a7bd..3f073144692 100644 --- a/tests/wpt/web-platform-tests/paint-timing/first-image-child.html +++ b/tests/wpt/web-platform-tests/paint-timing/first-image-child.html @@ -1,27 +1,24 @@ <!DOCTYPE html> <head> <title>Performance Paint Timing Test: child ignores parent FCP</title> +<meta name="timeout" content="long"> </head> <body> <script src="/resources/testharness.js"></script> <script src="/resources/testharnessreport.js"></script> -<div id="image"></div> - +<iframe src='resources/subframe-sending-paint.html' id='child-iframe'></iframe> +<img src='resources/circles.png'/> <script> async_test(function (t) { assert_precondition(window.PerformancePaintTiming, "Paint Timing isn't supported."); - const iframe = document.createElement('iframe'); - iframe.id = 'child-iframe'; - iframe.src = 'resources/subframe-sending-paint.html'; - document.body.appendChild(iframe); + window.addEventListener('message', t.step_func(e => { // Child iframe should not have any paint-timing entries. assert_equals(e.data, '0'); t.done(); })); - const img = document.createElement('IMG'); - img.src = 'resources/circles.png'; - img.onload = function() { + // Wait for onload to ensure img and iframe have loaded. + window.addEventListener('load', function() { function testPaintEntries() { const bufferedEntries = performance.getEntriesByType('paint'); if (bufferedEntries.length < 2) { @@ -40,8 +37,7 @@ async_test(function (t) { }) } testPaintEntries(); - }; - document.getElementById('image').appendChild(img); + }); }, 'Child iframe ignores paint-timing events fired from parent image rendering.'); </script> </body> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..f40329c212f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..9e6afa8634a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..e9637854a6b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..68ee1feb25c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..8c04f7860d4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..87f99d26dd4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..8cdc8dede5b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..f7ae7c74ce1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..becd45f8783 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..27fc28d29ef --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..3bf9a5cfb60 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..c73c02f11c1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..54964c2e866 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..e62a07937dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..078ef7e9461 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..688138da608 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..db4f954cb9f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..b580ed7ba4b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..54f1fca5c03 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..7833ada811c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..eea865cbf9a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..a13ab77a484 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..d0361907f57 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..c587938c982 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..065a3256d96 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..50df500303b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..f8480873f92 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..e8d912287ed --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..44ab6167931 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..d8171e58289 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..d84a62264b7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..94c2d3fff86 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..05a4d5b2232 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..e7643dc046d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..2b411898282 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..85b251417cf --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..fbddb8cf84d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..c5e0ef034fe --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..60131a195ac --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..46900881c32 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..b363223c47e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..d70a2568f9d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..bfa84ecdc19 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..05a16fb65c3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..214024aae28 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..d086e1d15c5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..1d942b99360 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..b76e0f06660 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..e684c67316b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..b829800781d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..bc683a4b60f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..516155748ae --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..fd681e7ba1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..92911e7d885 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..d0bf7f66f66 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..e34d1a3677e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..3dd7d39ca05 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a7de37ef77d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..e3813d88e60 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..54d040301a7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..5428aaff1f2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..a1c952d3727 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..d1017f2ce58 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..abbbd0c8ea5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..857ae5dc1d5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..9de68512ed9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..2a4bb3bf9a8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..b7cddf0a2d5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..1dc4dbb2fb2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..7d819ea89df --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..a661c0b47f6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..7fa375ba261 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..99b4c39e724 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for a-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..bcacae0fc1d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for a-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..dac69c16680 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..8d0ee75e759 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for a-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..b3c24b4878f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..67407fe3dbe --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..710ab16c838 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..e860035e539 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..6ea585ca7e0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..646e22376dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..a5a1058f443 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/fetch/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..ea1902955fc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/fetch/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..101fe0a2a3d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/fetch/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..1ae5656db27 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/fetch/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..26e10947f55 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/fetch/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..756771b91e6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/fetch/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..3696798c10e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..752103e4824 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..246d4569b67 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..daae0be23bf --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..be86876c477 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..eac91f8ac9b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..5c6cc8af9e4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..3e201353cfa --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..6afffde9a41 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..e58c9c86c39 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..c683c640dce --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..00e3faba945 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..643dbf57cea --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..1ce5b246fda --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..60391750948 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..f0664a9cab3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..a15835606be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..0ac09cc4e6e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..fff0b892e17 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..559fad08dff --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..1ebfd329ea5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..2de09dfbd40 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..185dd63cdcd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..1d4c618e1d8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/img-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..76daa7498ea --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..c0affda9424 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..32d80938cbc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..d96108c1f47 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..c8c3eb3be54 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..1ac02babc4a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..f4ea5314d84 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..11b4a93827b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..4b7f1b37dd7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..408019d52b5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..82d126fbf67 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..a76d7027ef2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..7e35b3b7a77 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..5bf4bfa2bb4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..a711ad1635b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..cbeb7fa0345 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..56b03263d44 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a90cce3bc4d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..2d932986b51 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..97a5be59966 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..4925b13ad02 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..4c90c3a92af --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..1bde08e912a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..d11b2d32b5f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..fdac47c4c8c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..179fa0e905f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..5aa09f0e770 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/xhr/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..41494f2b2a0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/xhr/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..ee1a86d2e72 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/xhr/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..3c67f3fb0bf --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/xhr/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..66b25c1a947 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/xhr/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..2a99dfca6c4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/no-referrer/xhr/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..4319759e6df --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..4550d19f645 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..8436020d904 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..b0f2963f50a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..3bbb5fd8515 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..2d156f3cbd7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..0f5c7adcec2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..9ab6a9cde13 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..5df2addb935 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..5af603ccec8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..43ea369cb09 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..9794580bf79 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..5c1e0bd634b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..a1d798e2c8c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..b52bf14464a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..5c716a9aa20 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/fetch/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..c0669c45630 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..eeee12c2985 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..511e78a5b4b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..907f209ef6c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..9bb1895fc50 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..66b5d659af8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..a1afeef02bb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a4444a31561 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..cd22e3b187e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..0ee2ccb108f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..93df080f4bf --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..b341f5897f9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..c4f33177c91 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..44aa807234a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..411308cb0a9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..09bd458272a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..280c4bcfa0a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..bc90c8444e2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..5a52a15fc91 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..210cdfd992d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..ba8141fab8a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..79fa59f597b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..cd8cd20e5ea --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..6dfaaca65bb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..76b9a77c7f3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..4de878bc7ed --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..64b03646454 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..55b5ae9af7e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..8cac2079b57 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..e729ba5359f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..f39df32c5f1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..2431175637c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..e3f84f9b833 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..3952ec5ba0f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..b3d4c41e40a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..050eb2a225c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..954ee8448cf --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..c39b578e23a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..4386db152d0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..2f17ab969f1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..ff527bf2314 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..332119c089a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..2ea2e5bab43 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..d869c62805f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..f5ac8234580 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..5089b306a50 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..a1c275f8ae4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..e65b343b7d6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..3ad030d1bc7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..2a142435b55 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..d42e7521ccf --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..3072a150b6f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..d86852da9d1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..52247283e4e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..4551ea307ac --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..5919d219bd7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin-when-cross-origin/xhr/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..bed59dce30c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..4f1398884da --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..834e58d6d5d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..21e9cda1211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..f89a3b86a1f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..296f5091fc5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..f0ba941c10c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..4b675063940 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..dc2d9b287fc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..00dc6d788f3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..e71ffd1db24 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/fetch/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a43e48b7293 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/fetch/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..c8aa2c57260 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/fetch/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..f2e5f3ea67a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/fetch/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..454fbdd9b76 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/fetch/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..50b9aaa414a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/fetch/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..0f15dafff52 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..85be8fd9a55 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..52b8f6bec56 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..f8123162374 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..332e76cbb56 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..5180682085c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..e3d72ca77d9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..d40ce7cec92 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..a621683979f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..0e0a0c31e95 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..69ddf44bd59 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..b645429c94b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..f65f670ea99 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..54dec4261cf --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..41c921541b7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..04b1346a138 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..da584fd70bd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..cd7053e3426 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/img-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..73d941eec9d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..b8d98904108 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/img-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..10a28522159 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/img-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/img-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..ed25c875111 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/img-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/img-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..fcd5bf094a9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/img-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/img-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..c8426ab5ed9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/img-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..46d481320d8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..c0ac69bb057 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..f64acc63838 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..23a55dff806 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..6cc1ad7e677 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..eb3b107a7ee --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..339072fcd74 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..884469b3b17 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..f50ba90ecc0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..407b5f9abc3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..3d138120a53 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..b2c9ebe42d0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..a13ac5aa52e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..99df1ef7a05 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..2e25290d32a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..9fe9894faa5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..c7e33944af1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..745a2072c47 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..8ba6c391865 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..89979df870b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..fa28cc4b928 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..2b250f81823 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..02bf0949633 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..74cb2ec4b24 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..a7dd77b40a0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..06291f55796 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..d622fb8001b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/xhr/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..620866cc8c6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/xhr/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..844aaa942a7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/xhr/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..5ece758b2d0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/xhr/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..66a0b8f765c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/xhr/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..8769049dd3e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/origin/xhr/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..56b2f3ebd42 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for a-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..a0590357361 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for a-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..0da54ff311a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..75593405966 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..1cbdcbe727e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..1be9c082534 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..f9cec5bbe38 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..cd9f25729f6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..817320a17fb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..214a9566e0c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/fetch/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..012a26262a3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/fetch/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..650f666bed2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/fetch/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..7bdb4f42b4e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/fetch/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..e7f837e1d44 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..4e6585ad736 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..b871bf35a9e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..2044588c129 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..0f862c06304 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..d71f21c3ed9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..eb0ef061240 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..9f342062f9d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..ffcc395289f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..5f32e4e5aa5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/img-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..1ff8be86402 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/img-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/img-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..0efac7ecc9a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/img-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/img-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..96dff0d3ccf --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/img-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/img-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..b087b2d6c36 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/img-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/img-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..ef3b8f5b3f7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/img-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/img-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..be9ba8e3840 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/img-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..73a5e8fb6fa --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a8ffd34a4cd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/img-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..baf270b01ff --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/img-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/img-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..e6262c4e594 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/img-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..27c14cefd11 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..1d6edaefeac --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..3f38e0ff798 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..c59c638c2c0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..a2dea0cef9b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..8c7630c1cdc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..8bd153100f9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..ae8c898cda1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..5cf5487d538 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..007e6dcec3f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..dc5bad44169 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..4cb8aed4a46 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..4178dd24f49 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a4248ab8661 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..6ff2357abf9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..919ab41e910 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..d8fc840ee85 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..6c38e2f7776 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..e591a32e979 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..6db12795000 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..108333c3518 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..0d8dbe5b5e2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..f098698ba14 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..904557f98ad --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..8088a7177bc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/xhr/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..0181595f086 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/xhr/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..9f83a15896b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/xhr/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..bbec412cfb4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/same-origin/xhr/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..8f4e7c700e5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..5bff9424779 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..5ae1967e030 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..cc3eb5770ef --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..ee5afe3a399 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..8b9bc0ea2a6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..8b84eaaed02 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..0507d527cdb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..62443bb6643 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..fb4189269c0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..09ba866f5dd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..7f0f55c31e1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..4ab586cd21e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..3b03470dcfe --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..7d6d6be171e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..3fcb3648aa5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..84f7e625970 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..9e1ccd8a98b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..ff631b90720 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..98c15c4b3dd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..73e684b2aaa --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..5ccd867b726 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..6f94c24eca9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..c98b7eb3153 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..09cd92dbaaf --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..f2971db5e60 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..874b4f9c5b2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..c8596aedf88 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..3519bc2f95b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..16a4c5eb37d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..f0870694f30 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..81bdb49dcb6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..aceaba602a6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..f6896c754d7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..f83e870b2bc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..318e6882e3e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..0632816eeab --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..e28f174b457 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..028d30bcf74 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..9698e8e8404 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..bc05ca5aee8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..66a11d2a52e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..51950f57f54 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..eaf1834d7ab --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..0933ae62e04 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..2f5d4527e0f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..e044bf4b1b2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..0a5187f3c75 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..08ca1b91fff --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..0cb1f70edce --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..13eaf407902 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..7ff2cc8e74e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..1ea30d739ac --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..48cfa9f33df --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..03e19e87bca --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..b1c8fce86f7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..d780abb9c1a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..1bf8b482d21 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..e6c065e56ce --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..19793ea0dd7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..3d7d89d028f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..0a4a6efa23c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..7199afd1496 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..e9e214b7191 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..688c84d56c2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..fc9672a22a5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..bb505dd00da --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..5afc8aaadfd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..32e74eecae3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..f553f6b934a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..36f9b3b0384 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..a35ee1933f0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..a15c0e6efa9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..b8cd52cfcc1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..2ee7b583fa9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..9d9442b93f5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..d8c73147ccb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..3702a7c309b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..e1bf069128b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..8ebd430883f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..53b0100e2a0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..7c85eddf2f4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..75647bd13c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..0f639b87750 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..a5bea3a4847 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..bda77ecc5f0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..9dae40b12a0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..2c567e08bca --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/fetch/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..7f0051ebbd3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..349511ddacd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..83ba0a7ad76 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..9dfd5f65fb8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..9c1c6af4b04 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..a810e382eb8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..2f4054b2370 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..fbd0cd62092 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..2d342621c89 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..0399f3f8d73 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..9933dc2583c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..e551f7bffbe --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..eb5e70cf0f4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..afdb332386c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..87142c081e6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..77cc5563183 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..1990ab2e933 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..5ecd4fbc1b8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..163a9a07912 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..e165a70e036 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..4c16f2c255e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..5cd9ecad323 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..d5129fe1d25 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..18d8dc60602 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/img-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..242befcdc2c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..6928a37709c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..91a78e48d04 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..4af70228b67 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..b6cf62e4cc3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..a64e1f3dbb6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..17dba7cac89 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..8b24901a480 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..6a5eabfbc8a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..4e8347f6828 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..4fe1010583b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..6415cd5f543 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..d923ce64c7d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..2658a467891 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..8f4185dfca1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..ee40ed1fa08 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..29f3acaec1a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..2336b56ba95 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..3c7ef80c95c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..5700833b3ec --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..4441c8b6122 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..3846cbef67a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..125cfdaaea7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..03ef5b9fb5c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..52221765d14 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..27424c21dd5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..d63fb553621 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/xhr/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..b7f96b6bf4f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/xhr/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..6eceb6e22db --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/xhr/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..53421d4c0ff --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/xhr/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..7287984faf9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/xhr/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..13e20da2fd6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/strict-origin/xhr/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..34bb1c4fd28 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..603c3386882 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..8d86bc65a30 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..209c6794f4b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..ba745454683 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..3482acfd3ff --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..70cad21f896 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..35cc7e0d5aa --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..6a013527261 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..5b7af5dbec8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..b3757f71770 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..5ec9566b407 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..bede71fd70a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..73ac13f9200 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..ceb87d3f101 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..16d4263d01c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..2f802ce6889 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..4fa165ce0d7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..6fee1b1faa1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..db8e0994899 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..8abc987c36f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..993a1a41fcb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..aed76d27519 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..3c2396950f1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..4568cf1e985 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..88e71db4d8e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..82145902310 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..02d2c3749f7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..b876dc4e0e4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..013892fc126 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..3873bb380b4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..1a2512a7c69 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..9c722c9b51c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..d7666572996 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..db1c7c0a010 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..8d47f095f46 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..ece921d5adf --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..128a542380e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..7bfc51aa708 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..eecafe8c51c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/img-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..340b2c031e1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..f1e120fc44e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..7969bbfa878 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..c66137720b6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..97f7c6c7421 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..fd747fa4c2d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..e327237cea6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..7272e9a765f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..e0046f75976 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..ec0c22ad563 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..5c16ca12135 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..41139ad07b2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..594d303e681 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..06ea15abe23 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..5b74bcc563a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..af11744a8bf --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..d403ca73360 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..9d148fb181a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..67538d49b81 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..f1e0c3b11a4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..0cf98782c07 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..fa89f63a8a6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..67316862c12 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..a7c82905c78 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..4c317bb0dc3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..c9b800edd3a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..04439c04f44 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..118247ec06a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..1d6c036fabb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..1d272b7e26c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..5b290f1f888 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..d7d7ca6a461 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "http-rp", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..b356da1e8e0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..d4553125f7f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..42deca6f529 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..783a286b7d7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..e096fde69be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..01ff5fdf718 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..c4d1442990e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..8967fc78818 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..b08192baf1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..171d908525c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..d06af26170b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/fetch/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..4ec30ea3a03 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/fetch/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..1a6478b206d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/fetch/same-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..0b07b0264b1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/fetch/same-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..5487c960fc6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/fetch/same-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..0cf4d2c0e06 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/fetch/same-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..c28f300af23 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..e04e1b902b1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..70dee43e158 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..6e45e08e90d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..9fcca116c4f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..c2025cbcf5e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..81403d6921c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..e502e90e6e1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..b1aef2bf4c7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..c3033a6e899 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..08805f9cf29 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..da8d438a7a2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..dca8e28f878 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..dc43ea62106 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..565e2dabf94 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..3774470b3ca --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..29d6f99255f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..613c5af5d19 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/img-tag/cross-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..b4fba605c36 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..31ab15865fd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/img-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..c655f801454 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/img-tag/same-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/img-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..cdf523b75b8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/img-tag/same-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/img-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..56006e38eb4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/img-tag/same-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/img-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..76f5588f8fe --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/img-tag/same-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..61b3dc353dd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..22dbcf6e0b0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..ba70f3e5394 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..757034e2d85 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..8147e540a85 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..68aa797c7f2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..5296cde8939 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..30ae08271c5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..62d681f182e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..43a71d98fa9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..ba7fa7358de --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..7e0eb5ae616 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..c48229fdc5e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..1dbc19eefcd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..0f642dd00bf --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..28ce5d3c446 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..e5219988111 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..1dd9edc8353 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..5fbad9e6837 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..1c7f32f2536 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..fa6538704c2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..86b997fc9bb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..2b88e6fd074 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..e573fac8930 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..a8ffa5661e9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..4bd7d3fe73f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..3922cd7832a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/xhr/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a583f1c93c5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/xhr/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..e7572b32d85 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/xhr/same-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..8980cab88fd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/xhr/same-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..5008a4a04f1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/xhr/same-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..f458232b593 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.http-rp/unset/xhr/same-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..0856dd60dfe --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..fd1d6cb9084 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..5604586150f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..6b4772c04b3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..0f2a564c3b6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..3c8153d962f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..5f0051a0435 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..ea9dfcd9229 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..d9bc5c2ee55 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..eb96568c049 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..1cfec9d648e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..1c8506015ff --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..e43e4feb379 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..90c5987b134 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..60032c3f728 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..7ad291cb1c1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..5324ef50ba3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..64ec01eff94 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..f9034cbfc1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..8278810f475 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..c61d2882267 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..9d23b1c163c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..746b5add732 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..4a725a4a1ae --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..a9b1288dc28 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..bff41a6b762 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..f5c46b11039 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..ca52358ae7d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..4879c8432b8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..16c11538c36 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..04b5c9e6900 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..9fa393762f9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..291ef87d3b8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..95e0a5a340a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..f470b57086b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..cb7cf373b5f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..a256ec8a82f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..d5b036fff9a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..61aa86e87db --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..f08b3780dad --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/img-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..24b806a345b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..35634b3b54d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..ecc149c6cea --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..c71c9b47106 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..8f329e62dac --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..8085715d22c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..cc94bde30a6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..d9b8215d9ac --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..d430d24d0f8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..c13f2b52310 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..2a67acf77bd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..97e8794de37 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..f79762d47c4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..8eb2cdd3a29 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..7b3fa647c6b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..15bba73460d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..355a3b4a91d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..d5b47f7050b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..f3f48d20fec --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..11e1ab4301c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..30e0635d568 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..a892f33ade8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..e9a6dcc2faf --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..bff2601d452 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..92297125a50 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..3f683a7c6a7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..4bc936c1f4c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..1d62c09156f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..f21dbbd29be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..98f63cfd84d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..fb960bd12d6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..10eb60d02f7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..2b7d0885674 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for a-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..3a85457e53d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for a-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..ac559922627 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..db39d5dce57 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for a-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..d2b101db20a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..e017d291aed --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..4ea6f334784 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..9af2ba0db2c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..9a252d76b23 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..0c00b965196 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..b2de42bac51 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/fetch/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a0dd0ed5fe8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/fetch/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..b3a137f3c30 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/fetch/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..51abb646d7b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/fetch/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..dc20690f5a1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/fetch/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..06a9d29052d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/fetch/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..bf08585f979 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..11523be8b23 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..15fc496d72c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..da8a0ce456e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..0cd42be3a5c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..587baabbf33 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..010cb7a9094 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..e2594948b8f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..2040cdc74c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..840da90ca74 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..b548bc92ba0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..3852ed86a54 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/img-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..e4d047ba750 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/img-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/img-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..b2b3b765094 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/img-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/img-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..e4d59f0eebf --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/img-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/img-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..ccbd4145749 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/img-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/img-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..3f69921a3db --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/img-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/img-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..c6a19c2aeb6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/img-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..32fcb5e2d6f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..49609cf5a4a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/img-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..3d9dc67d1b7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/img-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/img-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..1ea0a3752db --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/img-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/img-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..02c5e5291a2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/img-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/img-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..e17755c0cce --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/img-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..20b662df76a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..240f1b49a35 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..17732091351 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..ea0061e6e7d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..734f7b5aea7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..67656f63c0a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..8a0fc4ceee4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..098afa7850c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..278ae3ca0af --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..7894f567a7a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..38dfdce94ca --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..06b750064aa --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..dd5c8a41184 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a914c10d0af --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..1e7be717a74 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..e3d0f32bd31 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..b19b90ab568 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..3f84f298dd2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..c59df975739 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..cf7e209a2fb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..397a4e5fe9f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..d10e642a725 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..4adad7e6738 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..c4150cd1c19 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..bd1adb22332 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..822487de18b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..2cd6c666738 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/xhr/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..ab02834f0db --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/xhr/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..82be13a5996 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/xhr/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..7db551866db --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/xhr/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..ad86c86cddb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/xhr/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..351b64e50e7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/no-referrer/xhr/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..4625908d69d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..7884e4a3536 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..5a0e414c6c4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..0260815bc44 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..02c5e291363 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..af714b65271 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..6c5dfe5a8f7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..686d843f544 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..99c0afd4643 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..55d1077fb9e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..5ba4ba96d74 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..fe3fe787238 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..9fe0da53837 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..0b303315ecb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..53923cd04b1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..6cc0df42dc9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/fetch/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..d1823e29824 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..d301eac298a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..60f10bcf409 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..780d874ac16 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..575406d9e29 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..8a06f757e07 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..249bbae2104 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..49199a61fff --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..a45a24d0ce4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..9351d945339 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..a9d6f28f573 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..f973f791c80 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..6e2cc29943b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..4dbcd254672 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..6ec8964ef80 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..af4f6205811 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..23390144d41 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..1d141c48537 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..21bfa65bc38 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..1bf48c48d4a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..f3054cd8dca --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..e16c4a22184 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..9c3f9a6aec8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..f9a78040497 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/img-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..71440c69da4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..c7e428c39fa --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..9b89dea31ad --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..1720d3f976f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..bdeeaf88901 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..6403bfd19b9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..f94b8510938 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..ec892306fcc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..9f130968276 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..8d082df26aa --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..548ac93454d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..d1cc093fa78 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..0fbad23fdce --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..3d5491077da --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..341b4c61577 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..dd00c4fade2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..7769dcea809 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a0086558614 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..ab71ab617be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..d6bd4896d02 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..540f3afb192 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..ce6f0d71dc4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..5e8a2026ae9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..12ba6162053 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..df0834cdbb2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..0c8c4cea9aa --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..37eb120c3e3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..362e249deb9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..48ec25ab113 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..5073b173cc3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..c3a0b2bf60e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..6c0f2499bd9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin-when-cross-origin/xhr/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..7318a8c172d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..6cad3a73328 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..535a65e0665 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..53fe7d7255b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..f8b1036543c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..05b93c5defd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..e3f38f15bfe --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..00f0ad92895 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..53f7976e1a8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..d58826d2d1d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..87b4da86cdd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/fetch/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..b8d6662d987 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/fetch/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..ca8ab3206d5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/fetch/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..bf8621d9a0e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/fetch/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..c02a0a97645 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/fetch/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..aa75c1d93e8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/fetch/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..8f36fba79b9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..93c50925484 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..3867056bc90 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..fc166adf7fb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..e9e68105007 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..e76927a6eaa --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..4f890fdc43c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..5c9a5b9c64e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..8064bb587f9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..b412f948c8a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..776157c1eeb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..1b4bffe179c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/img-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..c05c94a575f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/img-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/img-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..e10e633f810 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/img-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/img-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..392082662c9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/img-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/img-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..3b78af8c3e3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/img-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/img-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..cfd1c4a12b1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/img-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/img-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..3596fbfb8e0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/img-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..4c72cae89a6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..4c32a090d67 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/img-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..32dea49c05b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/img-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/img-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..09f99d03e49 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/img-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/img-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..e2897c8eb40 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/img-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/img-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..8090a073471 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/img-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..c9e1737be9c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..0fe9c8b3dda --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..e447ce0cbd4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..a626eee923b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..c22dbde1b7a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..f08308c22c6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..a881e761525 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..6cbd35370e3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..84a1d142e91 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..328a098736e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..af30e7293d3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..71e9e368820 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..d8b7bb2c08b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..93a99944fa7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..8ec75fcf713 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..8e025cab9e7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..6fc3185b520 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..51dbf587a8f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..6e466bbfa1c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..11a507ad102 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..f427c38683a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..9d806833d53 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..456cb860b21 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..c1e15664003 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..399363aaadb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..ee98ddee55b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..b738f7704f2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/xhr/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..2268a7ca7c7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/xhr/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..ccc6d139bdb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/xhr/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..9ed89f4105d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/xhr/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..76ff6d82db6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/xhr/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..3d21f61daff --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/origin/xhr/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..b30ebd803bb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for a-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..b6692d3b463 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for a-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..03c4e2c7296 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..07f14cc13f5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..4db8473b114 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..9af0de43e46 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..95c5594d067 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..774e9471fa8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..32ed6546e9b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..5df37157716 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/fetch/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..854b1f1561f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/fetch/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..8fedf4bacb9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/fetch/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..0696fe607cd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/fetch/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..78f8d75a14e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..fcdd23a62e5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..f883c215562 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..ba2ca61187d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..b8457426af5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..3cdc766b829 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..3a301f19714 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..4ebc2e021f0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..ba93a87c1e6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..8669837c193 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/img-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..403b613da17 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/img-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/img-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..5a738175745 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/img-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/img-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..c99f5161bfd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/img-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/img-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..2a15d61d6a4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/img-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/img-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..6c7ef53b60a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/img-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/img-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..54135c8337e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/img-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..e0024793714 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..fdd6b94a4d1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/img-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..19c103f3c56 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/img-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/img-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..935cbd4403d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/img-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for img-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..5f4b2309cf2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..a1129cafc76 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..b8a2578a14b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..73c7f2fbee1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..f6704def12b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..cb70deec6c3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..96aed6e6fbb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a27f9fd0ae0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..42362420650 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..fbe418dcffb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..3578b8d1d6a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..4b249fa4a68 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..faefe995a57 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..b923af98945 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..d81372241fb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..5262ced797f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..ba305dfd4fe --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..50075471ab6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..d0b5e42b8ec --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..6fbb11f96d9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..df2c2a05bc4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..86eeca95a9d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..095f686a883 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..cd2e1107ffd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..a8eadbae303 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/xhr/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..3baa644f3f9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/xhr/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..e49f5ff7663 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/xhr/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..530b3b042b3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/same-origin/xhr/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..d5d52430619 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..947f570fd2c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..ae7fe3573b2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..31390261ec1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..d8d03381c14 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..7b2de467b99 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..7b3634e0de5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..a78a08341ef --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..e74bc959d4c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..24e5b477267 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..ef57a2c2dd7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..3d6844bb544 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..1ac65e20994 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..58a706ecb29 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..72ccbc4383b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..f1dcdffaec6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..d59d219f55a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..14ae1c210d2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..57e2a49de54 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..a4a51b3efc2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..4deda538071 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..4745f3e069e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..b2c34f667d9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..23c3f48f72a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..0e0d1c51897 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..1f08eca0ec8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..e09d23ceea4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..bbc2a62f62b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..cbaa18ac758 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..b06734ef480 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..ee85115cae6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..d302bfdd573 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..f4c992741e0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..bc5cf5d2503 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..4719a5e4cb8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..591edb3e0f4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..8571e12f9dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..5a72a055a5c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..b561822d2db --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..52fbad74221 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/img-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..c953780877a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..251ef6bf9ab --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..5969f8e0ef0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..3f739124c9b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..5f78af35394 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..f6b4ec0034b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..920d9edac9d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..5f11050aad8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..d27d31c4ffb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..6ecaaec2907 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..061f280156e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..6eebcac67ca --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..5e6fd0e58fa --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..fe068b72609 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..100b0aff0d3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..fa87a96d73c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..455d8dd56dd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..cca1d04da70 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..a90a3d448b6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..36b0dbeb47b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..1ef3bed3717 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..5efa06b5380 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..56be17b180b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..9671f4cec58 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..4dbd8d36626 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..fcf739f97db --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..e7eb46e8bad --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..57c90d61b34 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..b74ba1ab885 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..0b3950131b1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..ac7abe7c645 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..e2987d450f9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..699a2c54f51 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..7e6163bbc1c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..83e0b1e6edf --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..0ddfbd1ac6d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..abf83604b00 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..1b6d9c90e12 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..a50f26f78e2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..1f303a20fdc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..1096573b9cb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..830358f4d8c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..c0515bea40d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/fetch/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..e567d69eeea --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/fetch/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..be2f73135a5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/fetch/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..6432bc2abc1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/fetch/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..ae8cd826706 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/fetch/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..797fdafc794 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/fetch/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..e67750d113d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..01ae2a4ee98 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..2158fa58c1c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..d48c794b2ce --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..8afa4b5d858 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..8202ab21134 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..ba492c1973a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..c3cdcc3c0b8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..8013e1cd723 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..a66ca5086c7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..e7f3e88ab78 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..e300dcb9be8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..d0cf5fe43e6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..1e9873591b2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..6bbb93732ce --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..e1154425983 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..cc5f917bc56 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..4c569b64571 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/img-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..fd81645871d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..74cec03ac97 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..f09bc5f32a9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..9e3a7efaca4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..642b62a8e51 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..04ecc894f5b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/img-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for img-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..ad1b4ef8fce --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..25371e6b66e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..79f9876cce7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..2fe52eb8679 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..71824e82584 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..c5759134a4d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..7837973d05b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..e4e4784ad84 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..08dd0040b35 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..777c51474d2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..05271dff40f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..4b092cf5a01 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..0ab21e58cb9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..3f6116a7581 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..ccef018639a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..e6d90a6d5c9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..9a03c41b086 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..615be32dc92 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..738e4e65ffc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..faaeb0ca2d4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..c29f31a4967 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..3b591717411 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..f72939c7bc0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..1378d7b7269 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..054f107b0cb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..bb376a7edf4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..537781bc09e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/xhr/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..43ba59d840d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/xhr/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..2aa63232bea --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/xhr/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..eaaa51d0047 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/xhr/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..41b8b823fa5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/xhr/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..4373d591b54 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/strict-origin/xhr/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..46594fa5459 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..7a8df88c9fb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..4a810431fb2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..e9e24909951 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..3c6508eb4aa --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..c4d05b082e0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..5200005a8a6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..83fe863bb9b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..c3035b8402a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..d541f04293b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..8882d4575b6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..2b7bedc21b5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..a2c27ebef7a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..5d96b677cb1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..c8299202bac --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..d95e31ea2b2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/fetch/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..75206d3a12c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..e7b0d052437 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..d2805e63b56 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..c096c737e29 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..385538433c2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..21b9125cc5a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..e85b4a99ef3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..5818638e664 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..378736f7b49 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..dfef86f6c60 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..6e6b17b3a47 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..1272dbabe33 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..57d7dfdd63d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..1cdec8bef3e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..ed0f7c1ac49 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..486b3d1eede --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..9006c3154b4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..ffb9250c116 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..9dd3bdc8e57 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..747f51eff1d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..88225657563 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..97d7687d51e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..4ca7c83001e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..e9602ab4f17 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/img-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..c0803c3a12f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..8d9da54cbdd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..2a3cf647eec --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..27996587590 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..88380ab5b11 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..2846297142a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..901dffc26c0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..2bfb465bdd1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..5ba39d1da69 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..0d3f54153e5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..e47219b04ac --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..326b4e533d3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..dfde04b0bda --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..e56886b03e3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..b2b3e533251 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..6473f9456d1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..b433a34b5f8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..f5055a6ab7a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..18150e92986 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..775870de31e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..e4cc56e9e82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..424299d1871 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..a6620d674f4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..2adc36d4f67 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..dc3eb219b34 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..631c3d48582 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..68f9f937237 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/xhr/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..dc5706b1d49 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/xhr/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..77b0f0af6d2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/xhr/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..9cbab969476 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/xhr/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..41b15d0d5e8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/xhr/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..a0e9d13c8c3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unsafe-url/xhr/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..b356da1e8e0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..d4553125f7f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..42deca6f529 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..783a286b7d7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..e096fde69be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..01ff5fdf718 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..c4d1442990e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..8967fc78818 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..b08192baf1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..171d908525c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..d06af26170b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/fetch/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..4ec30ea3a03 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/fetch/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..1a6478b206d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/fetch/same-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..0b07b0264b1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/fetch/same-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..5487c960fc6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/fetch/same-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..0cf4d2c0e06 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/fetch/same-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..c28f300af23 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..e04e1b902b1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..70dee43e158 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..6e45e08e90d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..9fcca116c4f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..c2025cbcf5e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..81403d6921c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..e502e90e6e1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..b1aef2bf4c7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..c3033a6e899 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..08805f9cf29 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..da8d438a7a2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/img-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/img-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..dca8e28f878 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/img-tag/cross-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/img-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/img-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..dc43ea62106 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/img-tag/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/img-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/img-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..565e2dabf94 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/img-tag/cross-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/img-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/img-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..3774470b3ca --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/img-tag/cross-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/img-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/img-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..29d6f99255f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/img-tag/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/img-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/img-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..613c5af5d19 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/img-tag/cross-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/img-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/img-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..b4fba605c36 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/img-tag/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/img-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/img-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..31ab15865fd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/img-tag/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/img-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/img-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..c655f801454 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/img-tag/same-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/img-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/img-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..cdf523b75b8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/img-tag/same-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/img-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/img-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..56006e38eb4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/img-tag/same-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/img-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/img-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..76f5588f8fe --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/img-tag/same-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for img-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "img-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..61b3dc353dd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..22dbcf6e0b0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..ba70f3e5394 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..757034e2d85 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..8147e540a85 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..68aa797c7f2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..5296cde8939 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..30ae08271c5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..62d681f182e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..43a71d98fa9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..ba7fa7358de --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..7e0eb5ae616 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..c48229fdc5e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..1dbc19eefcd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..0f642dd00bf --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..28ce5d3c446 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..e5219988111 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..1dd9edc8353 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..5fbad9e6837 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..1c7f32f2536 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..fa6538704c2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..86b997fc9bb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..2b88e6fd074 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..e573fac8930 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..a8ffa5661e9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..4bd7d3fe73f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..3922cd7832a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/xhr/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a583f1c93c5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/xhr/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..e7572b32d85 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/xhr/same-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..8980cab88fd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/xhr/same-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..5008a4a04f1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/xhr/same-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..f458232b593 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/iframe.meta/unset/xhr/same-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "iframe" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/req.rel-noref/no-referrer/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/req.rel-noref/no-referrer/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..4a5f5ecfe3d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/req.rel-noref/no-referrer/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,41 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for a-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [ + { + "deliveryType": "rel-noref", + "key": "referrerPolicy", + "value": "no-referrer" + } + ] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/req.rel-noref/no-referrer/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/req.rel-noref/no-referrer/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..2f5fd5437ea --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/req.rel-noref/no-referrer/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,41 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for a-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [ + { + "deliveryType": "rel-noref", + "key": "referrerPolicy", + "value": "no-referrer" + } + ] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/req.rel-noref/no-referrer/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/req.rel-noref/no-referrer/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..32cd1c43b01 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/req.rel-noref/no-referrer/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,41 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [ + { + "deliveryType": "rel-noref", + "key": "referrerPolicy", + "value": "no-referrer" + } + ] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/req.rel-noref/no-referrer/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/req.rel-noref/no-referrer/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..9b11adb7cd7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/req.rel-noref/no-referrer/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,41 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for a-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [ + { + "deliveryType": "rel-noref", + "key": "referrerPolicy", + "value": "no-referrer" + } + ] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..3a2fef341a2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..cc0f4b65a03 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..9ad3aa7338f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..d6749143bb1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..44ef71e1af1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..1488bfcb08b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..5189e5b183d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..a2b9721f264 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..4db9f974404 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..e6dfa2678a0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..45012e9b11a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..893c4748d92 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..83df0e2190e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..c944eefddf3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..3bcccc38952 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..0f8d65b94e2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..20b86df9372 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..817b3768da6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..d13cbf741b0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..2fe4cc4cc4c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..8ac803d881f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..bca971f8e84 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..f13303867c6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..346f251cd18 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..2706bb4cd8b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..edd91848f79 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..9b3f5c000ae --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..3f42792ab4b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..454135a6897 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..f30073623a0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..de7fdc0e39a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..b62fc67630d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..fb32b5a503e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..99268639077 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..dcb04ca83bf --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..210c86e6a82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..a29cc6014c7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..66a8c719e09 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..09a2f75a670 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..e36b05c0138 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..e3611b9211e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..bf883026942 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..7d68c31060f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..8ab8ee001b7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..f1b99cfcd43 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..c567c3b30d9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..9684fc1efcb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..4e428f5a26f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..7247afb704b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..f2895596002 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..2beda3b8fcd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..a0a36004328 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..4f5a64a94b6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..8090ee6df32 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..8644d5a0dd3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..0871cbadcc1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..074728c2971 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..80845aac30a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..043f8b25646 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..9789c6b1454 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..8d2c7d62d05 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for a-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/a-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/a-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/a-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..3356ddd4eff --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for a-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/a-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/a-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/a-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..453be719b2b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for a-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/a-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/a-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/a-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..528dfdc8a4e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for a-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/a-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/a-tag/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/a-tag/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..9ee613a589c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..16bdcbd3662 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..4c0d6b1bc45 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..afa9578a90b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..273490cf78f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..7c364052af4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..a5bf8817a37 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..c4e5ae7aac3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..7dc9230eb32 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..1e5fda0ba41 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..8cd4f077be3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..234fc0efa04 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/fetch/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..9365b5ff308 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..269808d268e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..9390f85eb1d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..87c5977bab8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..333b50990c5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..edfb6d3079f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..e3c40e15aa4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..0bae17cb5b4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..8ded9a1a8f2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..24ae69a02c7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..a19cd9fcd6f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..cf0637a1236 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/iframe-tag/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..bed0df1ea56 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..595bdf9f548 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..22a6c54cbe4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..0900b74070a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..c0ae977af9e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..52af1a183b2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..c9eb1785b98 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..ae5d248f224 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..d569f7609df --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..9beee36b712 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..87a909b5eaf --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..3dcd278ac77 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/script-tag/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..2ac44d5037c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/sharedworker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/sharedworker-classic/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/sharedworker-classic/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..243dca79e81 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/sharedworker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/sharedworker-classic/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/sharedworker-classic/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..efe40e142b3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/sharedworker-module/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/sharedworker-module/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/sharedworker-module/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..1625ee4b84f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/sharedworker-module/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/sharedworker-module/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/sharedworker-module/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..f4e2f383fc4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for worker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/worker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/worker-classic/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/worker-classic/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..d9c879782f9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for worker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/worker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/worker-classic/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/worker-classic/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..48f0530f141 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for worker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/worker-module/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/worker-module/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/worker-module/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..e94c9052cdc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for worker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/worker-module/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/worker-module/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/worker-module/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..6c8ddad3aac --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..6f9539e1713 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..d897f770d0a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..ea7ebd0de02 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..ccc9c358a6b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..e9782928f1a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..0ba21b2dde8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..dabd5a4ba3f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..5f43861b82e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..780efef0895 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..4abad62c8e0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..49022942df5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/no-referrer/xhr/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..98e6f6d2743 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..79aa6bdd3e0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..b31a78b7e58 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..dcb22415f64 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/a-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/a-tag/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/a-tag/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..3b81e22fbaf --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..1cd333be1af --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..533cf24b696 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..b007a526934 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..c360718590b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..890fa68bc70 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..d73a425b05e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..4c06af7c5d2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..4678057b57e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..e753c24324c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..166a6776688 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..fa36e48208e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/fetch/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..e715d4b6248 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..1bf67fb7151 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..c86e2c0bd80 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..15ab61b9c1b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..f2ba3c48364 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..201c7d19e85 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..f657f82248f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..2bff97acfda --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..0c8a5b93218 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..485ae0445ff --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..658b1fe095a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..2732639b719 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..f3ac9015783 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..06554e4bfe9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..b3d71b211d2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..3edddd9aeee --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..40f45282bae --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..8e8cd34be1d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..1ec6f13d722 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..6939aa4b06c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..2fcd6aff532 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..6c153040306 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..fa79d7269f5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..cc092ebb94d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..3a99b1930ec --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..d0e4474f1c6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..b7ee419b2d5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..efe64233570 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..2ade2c6fc23 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..2d717af1fe8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..11428f8d00f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..70fa5775aee --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..d43208087de --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..8e12ec777d0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..3a8c98a3557 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..ed6546f9894 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..2333b3823b7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..03d6aeace81 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..7d468c866c2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..d2c1dd60e20 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..9271fe9043f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..f3b55366731 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..b2f5c938b13 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..df629d40d84 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin-when-cross-origin/xhr/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..e4d52e1a6d0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/a-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/a-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/a-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..b6b8ffa5c0c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/a-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/a-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/a-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..c085f58bd2b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/a-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/a-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/a-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..aade5bc9f0f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/a-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/a-tag/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/a-tag/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..5a31888e0e7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..1b4a1fb3f09 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..063000a73c4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..5dc7b4d3baa --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..1a0eb65669f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..50dd07cb669 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..fd4ce963463 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..e0c0411f1fa --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..6ef0d351685 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..ca22eec1ff6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..3473e1e86a9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..85d4011f135 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/fetch/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..8d4d6c5f878 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..9d91a5f2d51 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..8fad5110c9f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..e323ce596e6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..3eab85fec63 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..280f386fb66 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..08f66c76a8f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a9cfc209843 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..2d3c2e3340a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..0274d37ae6e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..a821f5f3ed3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..8df747a25f9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/iframe-tag/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..5f9ae9c0cf4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..fa879102e91 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..d1cab5cd07c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..6e7d68b6ad5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..f088e46b308 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..9f7feabb04d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..7aa791e90de --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..8ee1801df20 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..8884bb2e204 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..9444c8a1c20 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..c63d2a90632 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..6a8bda085d0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/script-tag/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..3f6d68561a6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/sharedworker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/sharedworker-classic/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/sharedworker-classic/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..bef5eb7da64 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/sharedworker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/sharedworker-classic/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/sharedworker-classic/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..b7c2b859a56 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/sharedworker-module/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/sharedworker-module/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/sharedworker-module/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..fa3a2cad441 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/sharedworker-module/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/sharedworker-module/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/sharedworker-module/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..2d0497d8455 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for worker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/worker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/worker-classic/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/worker-classic/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..984223140dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for worker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/worker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/worker-classic/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/worker-classic/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..a12d17d87ac --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for worker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/worker-module/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/worker-module/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/worker-module/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..c0fa2219a73 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for worker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/worker-module/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/worker-module/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/worker-module/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..b16b541c630 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..cfebe7ee6d0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..2965d4217c2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..dc4ed5acae6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..eaab3c16915 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..d6b2c75033c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..f548a0f5325 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..922193259a2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..379acc1be7b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..ce87a70cf5f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..54438244fcb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..c4fe5c745c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/origin/xhr/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..11ba0cff5b8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for a-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/a-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/a-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/a-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..e9b2fa290e0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for a-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/a-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/a-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/a-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..312e72fefc3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/a-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/a-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/a-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..df64ef001a4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..a7849a34a58 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..9227aa6504b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..eac631dcd85 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..6b9a3b87481 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..d5bd29863ac --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..2ad40ba02c4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..1d7537b7f62 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..eed719f8ff0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/same-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..9046b2917fe --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/same-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/fetch/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..8260fc22125 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..9b96eb83e80 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..9ce3ea32d21 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..b6777030d32 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..4a388161788 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..928c87fd527 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..f52c74c5b49 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..6594fe36dda --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..a35df42d943 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..2990c3865fc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/iframe-tag/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..0b845c4f0f5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..8fc0c790742 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..018303acb3d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..0803f353657 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..087dc921eab --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..1ae391213b7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..c5565d7c12d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..434f40b5b61 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..57f639b771c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..5c395ed626f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/script-tag/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..32a212bfdb9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/sharedworker-classic/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..b04cf9c48e8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/sharedworker-classic/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..c118be09e78 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/sharedworker-module/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/sharedworker-module/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/sharedworker-module/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..cde9e354070 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/sharedworker-module/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/sharedworker-module/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/sharedworker-module/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..37d927bfb01 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/worker-classic/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..1ba3a70a6f5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/worker-classic/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..4c26a76f830 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/worker-module/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/worker-module/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/worker-module/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..cb4c3f70051 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/worker-module/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/worker-module/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/worker-module/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..9d5ba540dc7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..b6023b9778c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..9f9749dfc9f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..2663cdccae3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..082795f8837 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..56b25d3c6d4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..0cef4142439 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..6492dca7752 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..1f4240d0f9a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/same-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..fd5d81f0de0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/same-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/same-origin/xhr/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..b86c8b029eb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..50272094e56 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..accb5c03a04 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..95fff01eedc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/a-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/a-tag/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/a-tag/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..216819e943e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..5abb91a541d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..65b343d1545 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..b329836048b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..ebe229fbc98 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..4ee020d7929 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..4aa4c2fbf95 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..4f302c832e1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..c1d7739619a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..e609db087e4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..88ecb331341 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..0a25c665b91 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..1f821352af7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..85c36a9d71c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..27eb9d179ba --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..8c0e86d6efb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..66baa979f31 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..8997425fb74 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..0f764baf6f7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..b2d1210eb1a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..8a44aa18290 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..1a86e9111c4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..207494ac581 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..e11b81e3e1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..35b43fb9e87 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..d43d4a7c62c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..edf9d48da67 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..8bfa78dd6b3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..0feaac68aef --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..24b3e8b11e2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..47f76dd7c2d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..3257160dbc4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..95c5dc502ce --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..35ce769a3f2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..7f66a377aaa --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..3d3ebd71c6b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..e02a3d9b47d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..0c2066808a1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..4558ecd695c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..b6ecf0acaa2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..f748c1a51ef --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..5eb46804d0c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..52b3b026379 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..9757249092c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..57e9557530b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..99bc501f0b5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..1c73ce0de3e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..f21311c253a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..c88d9308cac --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..3063087aebc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..6e823d5736e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..c72888b0ce4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..edf0f974de4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..89493f9d6ab --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..60e6d0bddc3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..af90b6d6d57 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..e47aa56c9a7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/a-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/a-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/a-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..a46564d17ca --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/a-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/a-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/a-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..14a9793f0f0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/a-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/a-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/a-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..79c592334da --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/a-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/a-tag/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/a-tag/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..8ca065157bf --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..bd1b3be4102 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..a16b2550cbb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..31bb5855a39 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..74502f566f2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..0fcb69a68f4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..1ed0eff201b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a2279630322 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..61918a3e2c9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..5ba49a8f9b1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..d48ad50c7d2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..39b88314d86 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/fetch/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..0fcfd219e72 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..ca1a84f1386 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..34dc34a37a0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..e37d0952549 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..d61b4b3fb75 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..4799959db4c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..05b1dfbe0ba --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..759cde4dfc3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..66150c45b96 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..ba343e5443e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..47b85b6f3a0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..1ff4095c70d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/iframe-tag/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..a4f4763d8e7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..07bd1f3b5a0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..c6d79ce7376 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..20853e45299 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..903deead116 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..179ac3c0b26 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..7ab79d44e34 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..d90330a1738 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..d103b98393e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..eefca7870fb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..d658b8ce2d9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..c9b2e5eff58 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/script-tag/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..cc59b7e9531 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/sharedworker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/sharedworker-classic/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/sharedworker-classic/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a792e81cf85 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/sharedworker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/sharedworker-classic/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/sharedworker-classic/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..5f469a739e0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/sharedworker-module/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/sharedworker-module/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/sharedworker-module/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..7e5756f013d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/sharedworker-module/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/sharedworker-module/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/sharedworker-module/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..ee1bd3961e5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for worker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/worker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/worker-classic/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/worker-classic/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..fe55ec98cc5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for worker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/worker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/worker-classic/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/worker-classic/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..0512934a374 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for worker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/worker-module/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/worker-module/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/worker-module/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..5706193e4e4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for worker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/worker-module/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/worker-module/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/worker-module/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..9585d997e70 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..00621ae93cc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..a8d0d935984 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..0a692126639 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..741b1e9fb6a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..1e9665e4819 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..21bae18c44e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..dafb3bf2687 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..cea515ee7f8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..47b2785202a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..bf95d5806a1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..738c32fcb7d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/strict-origin/xhr/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..407664e35fd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/a-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..67f97955b96 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/a-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..5a2f1bdb1f6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/a-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..67434f3d0a7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/a-tag/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..ac46787ff7a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..d4554d3e4cd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..ddd9f987778 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..f276ee956b2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..121c1d76cc3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..59a27ac548f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..32986880571 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a2bdffcb2b2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..1da9f319a17 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..d0db3b2d5fb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..8a003515e59 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..0adab74b2d6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/fetch/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..e08377542ba --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..cdeb4c3ebef --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..285eec2f230 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..471e0ea9b10 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..2fb911718b1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..b9fb45658a1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..b092f950755 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..f94e877e97a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..a6a912a8065 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..202e9b88bba --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..8fd0936de9d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..a3dcfeffbef --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/iframe-tag/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..abcc1ef277c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..9da73073d73 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..35dc11b49cc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..54a2764df4d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..fb3e161a156 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..3219a3a04f1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..578e2df044d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..bb821e04ebc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..6519e31d8f4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..fa0935b0d4c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..9a0b6cf447c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..ffa29b49d8f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/script-tag/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..d071ff9c1a2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..c440eee6120 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..a546a5b4595 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/sharedworker-module/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/sharedworker-module/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/sharedworker-module/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..14d11b8391c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/sharedworker-module/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/sharedworker-module/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/sharedworker-module/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..ed64f878208 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/worker-classic/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..6debb2df2a6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/worker-classic/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..47ac8bfec9c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/worker-module/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..1133da5bd32 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/worker-module/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..3956674c8b9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..56cf4577e42 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..0676836eec5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..121c882d364 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..fed3991b8f2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..a91d2f97578 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/cross-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..8cb267dc151 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..5697af56c53 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..071babf8163 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-http.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..491ecf16dc9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-https.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..014a1b1842a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-https.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..5b59ec8fcf4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unsafe-url/xhr/same-https.swap-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..75152e33bd0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..cce9287c83c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..04cb817b65d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..9f74c763b16 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..5ca0f069048 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..23486bd4715 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..828022035a1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..2ec65fccfad --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..59574ff0674 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..7e52ffd6599 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..90495c0aaa4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..d73d9fbec33 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..3287e6485e1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/same-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..cc1d014c949 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/same-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..0ac7079dc5d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/same-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..9f6100714ec --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/fetch/same-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..9ad7a08c331 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..bbf7c023df5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..19f1b7d7b26 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..006bee035ad --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..3d7b03876d4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..3c0fddbeb6b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..f7da334648e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..4a8645ea9b9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..4bcb5a48d83 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..59716636463 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..7ad0bb08359 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..ebe0978dfd2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..48a68a2d4b3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..a890c6e957a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..16b4615a617 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..fed78b96651 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..663bb848179 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..fa5d0191afa --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..0b18ad9dbe8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..be4e3382427 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..a6dd2d87549 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..a14956b1556 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..d273cef1be7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..dc18808d7b3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..886ddaaf001 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..b8540844959 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..3c7974c0570 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..ed0397be621 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..b5b54ff3db1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..57c8036d10e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..de8ff3735f5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..16ca268c59f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..838b4df0c18 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..731181dc005 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..370c65707ef --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..a8f8c47ae65 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..17f88a23e07 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..d6da2ac72b2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..6871d185250 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..98dcf64e4b9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..881bbe39e44 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/same-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..0a9d535a249 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/same-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..cafcb65bdd3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/same-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..b3542367e8a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.http-rp/unset/xhr/same-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..01c3cd00ac3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..6956c15c53e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..9b5aa0701a2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..f99ce37a558 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..97ec6a51361 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..1d1e4b73c3d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..f3d5596e0bf --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..3017305a91d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..6fa5feefef0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..20624a77442 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..ff4cae16582 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..69b4468abb4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..207c305f8ef --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..5dbe8d96ef8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..77b267f98c2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..1f3e0bfde07 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..093da149d8d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..226f6265396 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..c2a2fc68318 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..be5798a4b3d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..ecaa8bf9df3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..f4fc1c2e7e5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..1124a5043d1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..dc0173e5260 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..4a881a14a15 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..ad2890122fb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..58de421ca79 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..dbfc78fa426 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..635fe10a03b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..1e8352fb321 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..c82f6d36266 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..34e237137cc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..a38182aca39 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..973faa65f67 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..a27be45a160 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..f24db266d87 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..e68e68a1f0a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..add3d623038 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..99a3d33e332 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..6ebe6e7946f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..aa49f7c5a15 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a2a4ea8a2e1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..0f25791aa60 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..90c136c5858 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..116574047e7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..609ba3e9fc4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..c09f9d91a7e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..76733a3980a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..3f60fe0c76b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..9fe50942bb7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..2321fca08c6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..b31c62755a1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..6671b400ad2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..c94c3eea23a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..2458c5a9cfa --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..b69f1d55d9d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..9668e8f6a8b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..3f915feb046 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..67d3f865c07 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..b32cb708d2f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..ebd8d26311c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for a-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..7f94326a3a3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for a-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..d67d0cbb2ac --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..933286a3f36 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for a-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..5883de09c21 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..f37f4ad218e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..f0efb6418dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..a85a6a0750c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..03f7a91641b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..bacac0742a0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..b652986a7d7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..139bf5bb3fd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..c2c4e5af05c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/same-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..e2515f98729 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/same-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..b5de4be3654 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/same-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..2814386075c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/fetch/same-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..168063fbf9a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..b1975d72eb2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..36ce80b3096 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..1f32960a8df --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..4c4350d4e6d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..f93566ca5f8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..838f2d57772 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..4048956269e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..5a87c2384cd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..1f3041d9208 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..9c37ad07c07 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..be86732ab15 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..a659839d938 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..d4dfcec21b8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..992926d69cc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..7160935f41b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..270e8eb9d8a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..c0a36e09ad9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..9f5c9003c7f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..8393abf6592 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..a840371be16 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..f71589d3160 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..29af0c79573 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..67fecd3902b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..a7c3ad4d153 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..d3e10bda96f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..f4ebaef4d2d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..ab11b76cfcb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..4c05c978985 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..9a0cc8687b5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..7da2ce41bdb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..fb17b99ba30 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..7873f3748a1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..71c0c3d3099 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..2e265f98600 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..5a52fcbd37d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..e9c22f3f541 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..86fc2a5dcc5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..376106b37bd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..d3bddc68bec --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..eb9c34556d6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/same-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..cdfe8d2d37e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/same-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..7f60142913f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/same-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..9aebf625a54 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/no-referrer/xhr/same-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..1f24ead3512 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..dbb2d98a72b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..f3885bb941a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..49717dd22b4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..0b24369e0a0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..e58c9c7fc14 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..0ff47238f01 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..c6afd81f519 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..289acf0171b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..c1779de76d2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..527730156d2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..69314164bd3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..02aa00409c2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/same-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..314a2139a41 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/same-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..605932ba8f6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/same-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..71eb624a120 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/fetch/same-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..2a110c9df28 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..8ae166f931f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..591c1bb2a4c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..e5688042c7e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..ad0c432ea26 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..861ebd39ecb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..4925ee28bd4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..bd0d7159c74 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..5d9a63918c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..c2c2661082d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..0b462d709f3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..08782c17ab5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..9d72ec610a1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..e7d7fdf4f29 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..e03720044f5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..1946c908c97 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..e2f254decec --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..48d9eabae63 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..fe866a17c27 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..56e5a5de641 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..27a64353e00 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..5c4733e5b96 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..0cd3141bfca --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..d4ba20b5d51 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..8aa77e96165 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..2c2400abadb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..80670a9a650 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..31cdf445c05 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..ff8a4047ffa --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..6c8e0fc2292 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..bf6c431351f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..d993d4dcbc6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..f8537c6550d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..dfdefbf94c9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..1775abb14fc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..41420b2751b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..b7f2bb1f599 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..7d462a11630 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..7121f603b54 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..9de3141b0dd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..c362bfaebea --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/same-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..7341f6dab1b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/same-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..3c20985e0e8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/same-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..6dd235679dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin-when-cross-origin/xhr/same-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..426b0c3d200 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..a898860f394 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..280c500bdd4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..cf53a6de705 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..67391df90ea --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..adcf86e36a1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..d39c3b90727 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..075a6a66fe4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..19f875a404c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..eedb48ff7a6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..df3f3fb4614 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..8bce19247c6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..b1128b68742 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/same-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..d92756d2bf3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/same-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..3ad4747f8eb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/same-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..40aebbfd11f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/fetch/same-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..cc57e2cb2af --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..86619c1b965 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..d6630a346d8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..2def8f126e3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..7b104f15b05 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..3c4c70946d8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..905c2bdf1cc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..6592cf4addf --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..34e98256842 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..4b3757cac06 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..415b8e0f0b3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..33de474a8e6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..97116504257 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..5ea767bdd29 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..1d4527e3a7e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..6a554a20fe5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..e949b59ced2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..49b5c18de45 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..aa6dba552b7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..dd20864228a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..da05a20b368 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..3c432d077de --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..70b9c6d4b6f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..beb90e1dd8b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..3bbec514f99 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a1494ac3307 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..04bc91b9433 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..1939c3d7cb0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..71743d9e6d7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..361d9eb32c5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..20e6ae7b872 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..609672be73b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..f5279e5447d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..7cf80cf7470 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..c46f3d22343 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..d3bb446c915 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..0f74bd79679 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..c357bc42efe --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..39a76f815b9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..cf9eb7e2dcb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..f53ba9b55e5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/same-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..e43e0716ce8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/same-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..b9b5868de66 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/same-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..7dd9852a682 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/origin/xhr/same-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..425e5c8a282 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for a-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..4a9b6db2c6d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for a-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..3e11596560c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..e89e312c150 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..6fd63aa6dbb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..99f743bf4c2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..39d6c82e55e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..62c058f308b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..6d9a60f9a81 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..6dbb3e3ded3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..90a8ac23c56 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..2bd8354d72c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/same-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..83f0eecdb82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/fetch/same-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..00861bde442 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..d2f1c473c00 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..42f79a742ad --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..0056b5ca051 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..1be34e77987 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..421386b14e4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..234c45f3b1c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a4e0e8f79df --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..255d40751a0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..1b86baa1288 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..ed4480b575e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..8b0f0837d18 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..2a481a7b2a0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..0ce834419db --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..e30407c766d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..f208e2f49bb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..7375c854d90 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..352cda2bfe8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..0878e445160 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..42794f6e582 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..0be5078ac43 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..fff3d17cd6d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..a9aabdd67ad --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..eedb0686518 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..67fb316844d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a8f39b9aee8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..26983fd0350 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..716b5422e48 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..1914308d37e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..d70bf438d1c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..919bfdff85b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..8a87bc63e26 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..b3e36809b50 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..0bc184ed348 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..b6b0bcbb75e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..02b58eb7ef3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..e0d15b974b9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/same-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..5a6535706f0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/same-origin/xhr/same-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..f15c3565325 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..2e7289007bd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..c1ccd4d634d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..009f656cf6c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..4d137c1e5d3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..b369548fdf8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..baf694d8129 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..a70e3e062dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..75216f2bfc8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..956eba230b0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..0258302d058 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..9503debc140 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..2e3a8976b6d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..85a7e1fd7f8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..201cd08f6a2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..95fb03df670 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..cc19a771522 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..aa5ba3e6101 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..43bd2ef2e76 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..ed85afeb38c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..b0772be89e7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..ee2d19666e3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..9e1a69ca450 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..aee475dc394 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..3d744918425 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..4cc6f13922c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..e9cb6147d15 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..890e4ff576c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..61dae792be2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..28943bd65ad --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..97838e55dd9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..7ab0b1c802e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..fea32fc2cf8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..46eb52685f2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..cd058bca0f8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..1e70df0fe19 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..5eb124f8107 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..d9115a5b7e7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..87f087b0332 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..7db907cc0a7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..72897fb3250 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..75b69b0a6c9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..b313eed7ca7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..6422bd2800d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..6b3672701f0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a4d1a9e4bc2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..3b8b6d052e5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..dcb2de489af --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..dee666010b1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..87183fed8b6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..899b8869fe5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..d9bb92b4d10 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..a984c6af457 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..a9ab54b1acd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..10636992191 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..490464c2f84 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..f57d072e035 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..3a0e3b5cd92 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..80f5f769d83 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..124b069c7bb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..ef044190f3d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..29d0a80b3ce --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..8f6d8e3da84 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..977224a32d8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..e775754b296 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..d5b1c8676c0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..4f6d03dc292 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..ccfdb82d41b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..2486bcd382c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..98d4dd60f36 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..0bd6f4b64c5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..4c85a7010ed --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..713c83f5367 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/same-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..b65dd3ea98b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/same-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..cba70c66462 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/same-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..e52b0963840 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/fetch/same-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..6f5959b7982 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..b2e7484c49d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..bc490b6ece3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..8a54a7931b2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..f005a346051 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..b8a785f1800 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..61b291ba530 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..1c178722eb8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..f19a5c5d06a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..c4edc1bf8b4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..51269dcb131 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..7507462e915 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..7335b31d83b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..defbc30a0a0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..96cb00ae167 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..bb738de11c2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..7e62b7c298f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..443159429e9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..45f9a76aebc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..763e2c6ef90 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..48ef1e38258 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..436cf489456 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..6f253939d01 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..78c61c57885 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..579b3d68587 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..b82e2548939 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..aa51ab5fa74 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..93cb9c64d45 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..52ccb86b8c4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..92bfc37cff4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..56810a2673b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..cb2d04f1eb8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..f0db1d2f6ba --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..413a7e33260 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..8276fa0328f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..1df2ded6dc3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..b2a8ed0e418 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..d7b77d38e30 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..61377d5a629 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..87287ff6344 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..3ef61ba51b0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/same-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..6b843a8508c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/same-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..7cc0b3f2420 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/same-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..1e5d08942ac --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/strict-origin/xhr/same-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..7a187a39794 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..cfa4514f7e9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..e4c31baeec5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..88325059193 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..587f19558b8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..b9b5b709797 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..9b63358930e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..35405fd875a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..5356526fa2f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..4850e60c19d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..560f249a706 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..30eb4107f91 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..bf14218349e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/same-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..205782cf09b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/same-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..c3dd149bbcb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/same-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..a98bc509663 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/fetch/same-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..2f7639f1328 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..e3a641ef193 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..008bb200014 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..da17913629a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..d464d911afb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..675ade0a1e1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..94b6b4805eb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..172eb9380b3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..ce4f0606bee --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..97f10469680 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..f747c06b072 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..948eee0fdfa --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..36c2096560c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..9bb1df01daf --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..ab95c56e51e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..2344d58bc6b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..0004ce2ffa9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..e326a9d768c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..5f6262615d6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..7570cc49478 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..af0641f8c74 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..54feb663290 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..250e980c7fa --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..6069926a919 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..0a5f0f979f4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..32ca37a3de6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..c7216e1f587 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..0272dbffc75 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..285101d5992 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..29846f09a8a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..497776763c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..3193602fb6d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..33bbe1e7851 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..a92000f153e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..f182b840465 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..ec560e81e80 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..d8e3f74f955 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..6bd6426cf0d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..f56443098a3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/same-http.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..9c89f3e67be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/same-http.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..8d8169218f1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/same-http.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..af402a4ecc8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/same-https.keep-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..c7b94745b63 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/same-https.no-redirect.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..fa9a0b43c78 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unsafe-url/xhr/same-https.swap-origin.http.html @@ -0,0 +1,40 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..75152e33bd0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..cce9287c83c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..04cb817b65d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..9f74c763b16 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..5ca0f069048 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..23486bd4715 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..828022035a1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..2ec65fccfad --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..59574ff0674 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..7e52ffd6599 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..90495c0aaa4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..d73d9fbec33 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..3287e6485e1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/same-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..cc1d014c949 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/same-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..0ac7079dc5d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/same-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..9f6100714ec --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/fetch/same-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..9ad7a08c331 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..bbf7c023df5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..19f1b7d7b26 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..006bee035ad --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..3d7b03876d4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..3c0fddbeb6b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..f7da334648e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..4a8645ea9b9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..4bcb5a48d83 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..59716636463 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..7ad0bb08359 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..ebe0978dfd2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..48a68a2d4b3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..a890c6e957a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..16b4615a617 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..fed78b96651 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..663bb848179 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..fa5d0191afa --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..0b18ad9dbe8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..be4e3382427 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..a6dd2d87549 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..a14956b1556 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..d273cef1be7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..dc18808d7b3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..886ddaaf001 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..b8540844959 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..3c7974c0570 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..ed0397be621 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..b5b54ff3db1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..57c8036d10e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..de8ff3735f5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..16ca268c59f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..838b4df0c18 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..731181dc005 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..370c65707ef --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..a8f8c47ae65 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..17f88a23e07 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..d6da2ac72b2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..6871d185250 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/same-http.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..98dcf64e4b9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/same-http.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..881bbe39e44 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/same-http.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..0a9d535a249 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/same-https.keep-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..cafcb65bdd3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/same-https.no-redirect.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..b3542367e8a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc-inherit.meta/unset/xhr/same-https.swap-origin.http.html @@ -0,0 +1,39 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and swap-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..5426ecfd128 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..d324f904f54 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..d4fed058d04 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..196f009c3e9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..08f9b54cfd7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..dc009810794 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..df80425f9b4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..807c4a10d3d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..bf62b32874a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..4a8b52fad07 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..6dac23a18ca --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..daaf0539627 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..455ebd1643f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..d9934e4c71f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..37b73c297db --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..7da0da86422 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/fetch/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..ffcf21aca9a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..46383f9c5d1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..945fd75e305 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..391da44629f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..4c52ba6972c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..41a67c83ad6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..2102129b4f0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..40ed3cc6287 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..320e090d22f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..d80816c4407 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..31a5118e832 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..346129a7bcb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..dd16a036f09 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..fc6173804e7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..03d4b70713b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..284c0944cb6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..a9872069872 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..a55b5e121d8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..3f1baedea5c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..21c414e1047 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..81eed234b5b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..7968028f643 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..71ce4fd3cde --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..4c69c2379ca --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..d5101b8d775 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..9e5349f360a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..867e7af2db1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..6c1d09fb0b8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..6f2028e5bba --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..e37ebe80148 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..b5b5c173c4c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..56623fd8b0b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..1ab57a75731 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..ad0f8befb6d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..55ab73cccd7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..e0b2cd83267 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..9c50ea8fec5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..feb7d2342d8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..c21868a1b73 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..cc48d7617ec --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..73a2fa2dc2e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..3bc24c29599 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..00b0c7d4d4b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..4385366c128 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer-when-downgrade/xhr/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer-when-downgrade" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..214b9fb3ddb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for a-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..8cab1eab148 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for a-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..cc2134ea076 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..efb6d9f77d5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for a-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..3a1d699657d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..e84a4e36e74 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..8581a76deb3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..3df67976f54 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..b0f39b23536 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..bc7ebbd5ae0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..597bcd1c74e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/fetch/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..3706c2fee71 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/fetch/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..3d711fe8752 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/fetch/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..1f6d5e78d99 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/fetch/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..9bfa9f6b070 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/fetch/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..06fab128e71 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/fetch/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..3560ff9b4d7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..45b0449e9f5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..c8b43cd9b36 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..4254b233b23 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..56cebd5d558 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..ec453eb840e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..5e599f3e03b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..33d047320f6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..ecbb7e0047e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..334c63003f9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..a102909bfda --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..3cbec9f31ea --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..920464fd700 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..6bb6f5a0af5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..4ea1bbead74 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..7386cc1fd19 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..16d46ecabea --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..0ecffdd361e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..b0c20849b05 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..db8129b83c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..0d3b14520e4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..a53762aa016 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..0e6b5a2929b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..0307c95e48b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..02d61af329c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..0fa721bf0e2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..c359962e91e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..adb652228f3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..9a36162f2fe --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..83e7a87c269 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..6b2f35f5677 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..20633ad7aa6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..3cd819762a5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..48a848456dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..0d76892ded5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..aa1ac2839ff --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..1a1ee84b8f8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..a376edb23a9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..dd091e2d6b1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/xhr/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..d8282a73f8d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/xhr/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..f6cf5c6b439 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/xhr/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..156a744cb7c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/xhr/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..ac0a9ec10d6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/xhr/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..5ec2fede54c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/no-referrer/xhr/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "no-referrer" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..1299dce3fcd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..0c8182d3e9b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..45643283c94 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..6ec77a44d63 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..2c4ae1c7fa3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..7ae2d65964e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..442b14c4abd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..a2ab30e4fb5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..914365cf6b3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..3ce4038bf29 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..ff0dee3f84a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..c9fe7fae764 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..8427c5db2c7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..da57e367754 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..195bc38cddf --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..78c5892bef0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/fetch/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..5a3e8177fb3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..47a2ca3a350 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..6e1d0632091 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..05477625ca8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..4705dacf411 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..0d8b84afc7c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..867c5429953 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..82ac3cac8f2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..7d004b4abcb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..c58241c288c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..11ccf922992 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..0e3a085267d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..8c0c328fe9a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..aaa0ff21c66 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..2575fe7433b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..7dc159c3995 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..7f69cd9c3de --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..1dc67487f20 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..b9706b2e97c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..d2c59b9b218 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..622014b32f4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..14a3ba6ee99 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..ebd5d9d37a3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..f43c0fee159 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..0523759326a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..acc82cd1e49 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..bb64c8dde07 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..f9e61b0d0b0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..dd962996b6b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..086170ddb35 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..2c85597e745 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..dc82efdc22d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..a11264d5617 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..c11c20ec931 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..5bffc46598f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..3b82d9728ef --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..fa6b1d59800 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..ddc6b7e13cc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..df563dfebbd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a478223906d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..b4073ef0a36 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..7833ba4b13d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..b70d0234990 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..01061cef585 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin-when-cross-origin/xhr/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..85ba98a94cd --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..f4d43d42482 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..5e62712e49f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..b22a3e5b33a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..a8c4d2b17b4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..d8ffe31bc56 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..30b51652051 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..e24e250cf31 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..cacc4b78fe0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..9a3139094e8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..89736d097b7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/fetch/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..2255304631b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/fetch/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..bc09cd95f45 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/fetch/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..d4b5986ca62 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/fetch/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..cd047a55f1a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/fetch/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..f64b9357f7d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/fetch/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..2aa31ab673a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..f0475e765b9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..75de729976d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..f10df76268b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..08697c2ec1d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..0e92d11f2f7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..af48e784e80 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..6cf5381725f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..597672c3e31 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..155287e874a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..3bf5aa8ed1a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..1c054a2c525 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..7fbf73d2235 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..32f4101faa7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..0b1b5e7aa1d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..36c93ecbe03 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..c8dc3a32df8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..6482d0143ec --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..0d0f8b3ef2b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..d7c326118f0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..3fc83a5e58a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..41d96017529 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..140165ed81c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..83dd2e6ceae --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..453e4f734f7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..e3c4030dfc5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..01103dd12b7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..6339c6d630d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..8f53f3da0dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..06834c30bdb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..b785bc0152d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..c8f11d4eadc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..cfa443de866 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..231b63d3cf1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..bb31867ea32 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..9cbfcf13f7f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..48cd309e903 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..644b19d059e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..78e99afd7ec --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/xhr/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..780a93d1ff7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/xhr/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..2e0126ba7b2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/xhr/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..e3827631b36 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/xhr/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..c084fccc8a3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/xhr/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..da4895ea1b2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/origin/xhr/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..b322d0d96a0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for a-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..9ffe1dfbb88 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for a-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..351c8d1f83d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..d53d902779d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..c02d94cd0cf --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..01358c3d971 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..58715c8a3c9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..3a97072bb4b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..a12bc7d806e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..29fbaa58a3c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/fetch/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..53d471f99f0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/fetch/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..a2caeb86af7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/fetch/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..b74a717e276 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/fetch/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for fetch to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..26839b535ad --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..8be9fee4041 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..c59b1d5148a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..fc454a5e056 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..93c81c251b2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..aaaa619c484 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..794c15b6de4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..6755a5f83b6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..7fab40d212d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..39e6f548314 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for iframe-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..f98839750d5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..41e66c1af2b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..ab8db0b395b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..1dddb4184d3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..fc4b91ccab0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..6253eaccee5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..5449f385b99 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..487d9f1f538 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..d54c1bc2755 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..b258eaab271 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..d98848602db --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..f634eb8120e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..c9859f925d4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..36733e03067 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..9a7c6542bda --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..508df58dfd7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..9aca76c9856 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..ce3c37b7ed6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..67ad49392d8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..ac352c71672 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..bbb9d5b8a7d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..7b7863c9e3d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..f3ae9a17a28 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..5d0d30a356d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..3621997477b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/xhr/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..1999cbed712 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/xhr/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..46a547afd76 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/xhr/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..4a5c2bb5e39 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/same-origin/xhr/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects omitted for xhr to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "same-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..ca2a1b97153 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..64fd7ad5233 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..4de4c4c4465 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..1c952b34556 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..a3d629e2976 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..14624c93559 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..ff1855f88a8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..05950819a0e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..b25dba78e12 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..fe8e874748b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..318df2c4569 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..178fe9388e2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..e46e9337959 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..80a4d3d16c3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..13d07ca62f3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..dfe920290de --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/fetch/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..290f111b8bc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..d0d72c46ca2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..3d7474c5ede --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..4479da03a45 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..339871c5979 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..41c0c9da621 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..6773f282679 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..4c3815de20f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..4daf031b50b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..17f1a0b9732 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..1a8a664a1e8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..4efb4b0c3ab --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..47ef5e50c77 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..dfdae02e869 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..2a5b00c2b7d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..9d36cf40ecb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..aadd1e68ecb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..f0971a199e4 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..e5919653320 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..9fd4c83a4aa --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..b0844d88da1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..82489de2932 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..a6a6ead2615 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..78c68e126d3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..c86adf0d3a7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..ae607734d5a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..f3f91636d0b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a6dd64283ba --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..48edd50c3e7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..576b48568c1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..d1b9d8c0d15 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a88fc1d1d83 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..125029681eb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..5eb2c4f9094 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..388e3a22407 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..4b0bfa061c7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..848ebc2bd67 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..fac0c8b56a0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..7da56607307 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..cc25fb06b1c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..ba0afedac29 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..3b50bd1bf06 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..975f3586f05 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..e7516c78b10 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin-when-cross-origin/xhr/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin-when-cross-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..561cd207dd1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..4ed7f8927db --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..c7acb1395d9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..b1778a82f21 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for a-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..d4e325b62a9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..b34e4d525a2 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..baea1207538 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..78e002fc3b6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..3cf9d67008c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..dd8fdbfa678 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..d5fdf5b7d0a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/fetch/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a285d5a2a30 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/fetch/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..81c4243b485 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/fetch/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..8105d43b93e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/fetch/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..79b37f9f086 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/fetch/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..8875e2fca0b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/fetch/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for fetch to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..337fec90c5a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..cb5fe948a74 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..21bf064ca6d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..ea6702b09b0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..867d0884509 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..f519d7d2ed3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..5a97fd9a1ca --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a610c950e0c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..2156890dcc5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..7696aa2e66b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..9385cf807e0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..5344680a413 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for iframe-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..c99c78b4a69 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..7997911057b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..69b3340ed3e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..ddc9991a681 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..a48d942fbe7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..1941a1e7ebf --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..27b15101b2d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..edd0fd7eb21 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..d07b8938675 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..c2d61e41da7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..fe93a6bb3fc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..20da99760a1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..27186b188cc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..0e49e246346 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..2691eec477f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a2dc417f6ec --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..5098efe85ab --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..ab5bea5fa30 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..5ac168dd73d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..75ba8e5705b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..d20223a368a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..46ef564b09c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..2541a9049ca --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..35e9a55d56b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..0c3c0973641 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..3eb6500e3af --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..e33c95c47a8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/xhr/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..d69e0c2e567 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/xhr/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..9b85f353385 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/xhr/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..5a90c5c6d33 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/xhr/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..ca79e1b7f2f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/xhr/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..40c4ee402c5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/strict-origin/xhr/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for xhr to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "strict-origin" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/a-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/a-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..122cee47d28 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/a-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/a-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/a-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..dd6454a3f5b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/a-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/a-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/a-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..951ff0cfcfa --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/a-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/a-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/a-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..645a7522aa5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/a-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for a-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "a-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..56c63ee4468 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..d76670f2702 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..7eceb16e630 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..ed5ed077350 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..cb1eee5e168 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..9095eb6a601 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/same-http.keep-origin.http.html new file mode 100644 index 00000000000..36a791d6f2b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/same-http.no-redirect.http.html new file mode 100644 index 00000000000..2475c98b8d6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/same-http.swap-origin.http.html new file mode 100644 index 00000000000..7e493bb755e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/same-https.keep-origin.http.html new file mode 100644 index 00000000000..15dcfe9e861 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/same-https.no-redirect.http.html new file mode 100644 index 00000000000..4d25968093a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/same-https.swap-origin.http.html new file mode 100644 index 00000000000..59ab310bf87 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/fetch/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for fetch to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "fetch", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..0e98bc460c1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..cab9d79ffe7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..0b28e9870f8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..0358262f7bc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..d4107b4097c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..c647c58c119 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..d905791e9eb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..eeac9db1064 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..9d76a0e68fa --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..f219b56bdf9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..384a9905b9d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..3dfaf83ba9c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/iframe-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for iframe-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "iframe-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..4a28d8e718d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..d65d5be25f8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..f0a4d9d9492 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..9aff64848ee --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..40ffdfad30d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..6756001846a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/same-http.keep-origin.http.html new file mode 100644 index 00000000000..8aa74fae556 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/same-http.no-redirect.http.html new file mode 100644 index 00000000000..e93147004f7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/same-http.swap-origin.http.html new file mode 100644 index 00000000000..01b6d58e85a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/same-https.keep-origin.http.html new file mode 100644 index 00000000000..853b3443571 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/same-https.no-redirect.http.html new file mode 100644 index 00000000000..d951789c98a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/same-https.swap-origin.http.html new file mode 100644 index 00000000000..cb7d97f25ba --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/script-tag/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "script-tag", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..4f907d6f594 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/sharedworker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a1fb641d94a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/sharedworker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..a1b0e43ebe3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..39cf68c282e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html new file mode 100644 index 00000000000..036fb39f0e0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/worker-classic/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html new file mode 100644 index 00000000000..dcfd35a865f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/worker-classic/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-classic to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-classic", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/worker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/worker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..595d1d01ffe --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/worker-module/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/worker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/worker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..c5102b79202 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/worker-module/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for worker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "worker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/cross-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/cross-http.keep-origin.http.html new file mode 100644 index 00000000000..94d203b046c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/cross-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/cross-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/cross-http.no-redirect.http.html new file mode 100644 index 00000000000..9b38e34562c --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/cross-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/cross-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/cross-http.swap-origin.http.html new file mode 100644 index 00000000000..e081cadedb3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/cross-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/cross-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/cross-https.keep-origin.http.html new file mode 100644 index 00000000000..2a9057f53a8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/cross-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/cross-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/cross-https.no-redirect.http.html new file mode 100644 index 00000000000..ffcab5bd5a7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/cross-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/cross-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/cross-https.swap-origin.http.html new file mode 100644 index 00000000000..4acc4ec24ae --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/cross-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to cross-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "cross-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/same-http.keep-origin.http.html new file mode 100644 index 00000000000..5d270d5367b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/same-http.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/same-http.no-redirect.http.html new file mode 100644 index 00000000000..6ddbee09cb6 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/same-http.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/same-http.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/same-http.swap-origin.http.html new file mode 100644 index 00000000000..246d54d11e8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/same-http.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-http origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/same-https.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/same-https.keep-origin.http.html new file mode 100644 index 00000000000..680b9ffe75f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/same-https.keep-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "keep-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/same-https.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/same-https.no-redirect.http.html new file mode 100644 index 00000000000..44015b3d435 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/same-https.no-redirect.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "no-redirect", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/same-https.swap-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/same-https.swap-origin.http.html new file mode 100644 index 00000000000..fb427fc8e54 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/srcdoc.meta/unsafe-url/xhr/same-https.swap-origin.http.html @@ -0,0 +1,46 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for xhr to same-https origin and swap-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-https", + "redirection": "swap-origin", + "source_context_list": [ + { + "policyDeliveries": [ + { + "deliveryType": "meta", + "key": "referrerPolicy", + "value": "unsafe-url" + } + ], + "sourceContextType": "srcdoc" + } + ], + "source_scheme": "http", + "subresource": "xhr", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..6c11d2b6b56 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,34 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..5131a5fc90f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,34 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..180358e691b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer-when-downgrade diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..6deade61026 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,34 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/sharedworker-module/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/sharedworker-module/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/sharedworker-module/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..50452b28d02 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,34 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/sharedworker-module/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/sharedworker-module/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..b3b55087edb --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/no-referrer/sharedworker-module/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: no-referrer diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..5b1fa137f03 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,34 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..14ba28acaa3 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,34 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..a15ea7c65c8 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..a97b4df1a40 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,34 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/sharedworker-module/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/sharedworker-module/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/sharedworker-module/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..5f5ef2f76bf --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,34 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/sharedworker-module/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/sharedworker-module/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..ecff74b90dc --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/origin/sharedworker-module/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..d1f75700bd1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,34 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/sharedworker-module/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/sharedworker-module/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/sharedworker-module/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..096d609d546 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,34 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/sharedworker-module/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/sharedworker-module/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..be66cf93211 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/same-origin/sharedworker-module/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: same-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..d2b2301c944 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,34 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..877bc33d911 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,34 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..4cff1d12f82 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin-when-cross-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..ec2c9f2fbd5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,34 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/sharedworker-module/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/sharedworker-module/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/sharedworker-module/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..8cd322a0382 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,34 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/sharedworker-module/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/sharedworker-module/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..1c32fba5a1e --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/strict-origin/sharedworker-module/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: strict-origin diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..622dc9211a0 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,34 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-module/same-http.keep-origin.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-module/same-http.keep-origin.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-module/same-http.keep-origin.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..2eb2fe65e9f --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,34 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-module/same-http.no-redirect.http.html.headers b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-module/same-http.no-redirect.http.html.headers new file mode 100644 index 00000000000..c1d3fd1a0be --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unsafe-url/sharedworker-module/same-http.no-redirect.http.html.headers @@ -0,0 +1,2 @@ +Access-Control-Allow-Origin: * +Referrer-Policy: unsafe-url diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..133fcdef1ff --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,34 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a7c8c00c795 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.http-rp/unset/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,34 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..d9a524d216b --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..488613c2b13 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer-when-downgrade/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer-when-downgrade"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..372b3c2dea9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..96c2ba8ed3a --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/no-referrer/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that sub-resource never gets the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer"> + <meta name="assert" content="Referrer Policy: Expects omitted for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="no-referrer"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "omitted", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..9134e575973 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..77319d8c3ef --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..c20c3915791 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..b7565c9d50d --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/origin/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..e1a9d557736 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..30e1cb54cd9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/same-origin/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="same-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..0e552163f42 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..9535b9672d7 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin-when-cross-origin/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin-when-cross-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin-when-cross-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..d9972bee6db --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..e08aa96dbf5 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/strict-origin/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'strict-origin'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin"> + <meta name="assert" content="Referrer Policy: Expects origin for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="strict-origin"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "origin", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..cce34ecbed1 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..fb448d685d9 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unsafe-url/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,35 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is set to 'unsafe-url'</title> + <meta charset='utf-8'> + <meta name="description" content="Check that all sub-resources get the stripped referrer URL."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <meta name="referrer" content="unsafe-url"> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/sharedworker-module/same-http.keep-origin.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/sharedworker-module/same-http.keep-origin.http.html new file mode 100644 index 00000000000..133fcdef1ff --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/sharedworker-module/same-http.keep-origin.http.html @@ -0,0 +1,34 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and keep-origin redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "keep-origin", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/sharedworker-module/same-http.no-redirect.http.html b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/sharedworker-module/same-http.no-redirect.http.html new file mode 100644 index 00000000000..a7c8c00c795 --- /dev/null +++ b/tests/wpt/web-platform-tests/referrer-policy/gen/top.meta/unset/sharedworker-module/same-http.no-redirect.http.html @@ -0,0 +1,34 @@ +<!DOCTYPE html> +<!-- DO NOT EDIT! Generated by `common/security-features/tools/generate.py --spec referrer-policy/` --> +<html> + <head> + <title>Referrer-Policy: Referrer Policy is not explicitly defined</title> + <meta charset='utf-8'> + <meta name="description" content="Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set."> + <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org"> + <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policies"> + <meta name="assert" content="Referrer Policy: Expects stripped-referrer for sharedworker-module to same-http origin and no-redirect redirection from http context."> + <script src="/resources/testharness.js"></script> + <script src="/resources/testharnessreport.js"></script> + <script src="/common/security-features/resources/common.sub.js"></script> + <script src="../../../../generic/test-case.sub.js"></script> + </head> + <body> + <script> + TestCase( + { + "expectation": "stripped-referrer", + "origin": "same-http", + "redirection": "no-redirect", + "source_context_list": [], + "source_scheme": "http", + "subresource": "sharedworker-module", + "subresource_policy_deliveries": [] + }, + document.querySelector("meta[name=assert]").content, + new SanityChecker() + ).start(); + </script> + <div id="log"></div> + </body> +</html> diff --git a/tests/wpt/web-platform-tests/referrer-policy/generic/spec_json.js b/tests/wpt/web-platform-tests/referrer-policy/generic/spec_json.js index 27961c5de5c..a8b723d5a98 100644 --- a/tests/wpt/web-platform-tests/referrer-policy/generic/spec_json.js +++ b/tests/wpt/web-platform-tests/referrer-policy/generic/spec_json.js @@ -1 +1 @@ -var SPEC_JSON = {"selection_pattern": "%(source_context_list)s.%(delivery_type)s/%(delivery_value)s/%(subresource)s/%(origin)s.%(redirection)s.%(source_scheme)s", "test_file_path_pattern": "gen/%(source_context_list)s.%(delivery_type)s/%(delivery_value)s/%(subresource)s/%(origin)s.%(redirection)s.%(source_scheme)s.html", "test_description_template": "Referrer Policy: Expects %(expectation)s for %(subresource)s to %(origin)s origin and %(redirection)s redirection from %(source_scheme)s context.", "test_page_title_template": "Referrer-Policy: %(title)s", "specification": [{"name": "unset-referrer-policy", "title": "Referrer Policy is not explicitly defined", "description": "Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.", "specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policies", "test_expansion": [{"name": "insecure-protocol", "expansion": "default", "source_scheme": "http", "source_context_list": "*", "delivery_type": "*", "delivery_value": null, "redirection": "*", "origin": ["same-http", "cross-http"], "subresource": "*", "expectation": "stripped-referrer"}, {"name": "upgrade-protocol", "expansion": "default", "source_scheme": "http", "source_context_list": "*", "delivery_type": "*", "delivery_value": null, "redirection": "*", "origin": ["same-https", "cross-https"], "subresource": "*", "expectation": "stripped-referrer"}, {"name": "downgrade-protocol", "expansion": "default", "source_scheme": "https", "source_context_list": "*", "delivery_type": "*", "delivery_value": null, "redirection": "*", "origin": ["same-http", "cross-http"], "subresource": "*", "expectation": "omitted"}, {"name": "secure-protocol", "expansion": "default", "source_scheme": "https", "source_context_list": "*", "delivery_type": "*", "delivery_value": null, "redirection": "*", "origin": ["same-https", "cross-https"], "subresource": "*", "expectation": "stripped-referrer"}]}, {"name": "no-referrer", "title": "Referrer Policy is set to 'no-referrer'", "description": "Check that sub-resource never gets the referrer URL.", "specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer", "test_expansion": [{"name": "generic", "expansion": "default", "source_scheme": "*", "source_context_list": "*", "delivery_type": "*", "delivery_value": "no-referrer", "redirection": "*", "origin": "*", "subresource": "*", "expectation": "omitted"}]}, {"name": "no-referrer-when-downgrade", "title": "Referrer Policy is set to 'no-referrer-when-downgrade'", "description": "Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.", "specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade", "test_expansion": [{"name": "insecure-protocol", "expansion": "default", "source_scheme": "http", "source_context_list": "*", "delivery_type": "*", "delivery_value": "no-referrer-when-downgrade", "redirection": "*", "origin": ["same-http", "cross-http"], "subresource": "*", "expectation": "stripped-referrer"}, {"name": "upgrade-protocol", "expansion": "default", "source_scheme": "http", "source_context_list": "*", "delivery_type": "*", "delivery_value": "no-referrer-when-downgrade", "redirection": "*", "origin": ["same-https", "cross-https"], "subresource": "*", "expectation": "stripped-referrer"}, {"name": "downgrade-protocol", "expansion": "default", "source_scheme": "https", "source_context_list": "*", "delivery_type": "*", "delivery_value": "no-referrer-when-downgrade", "redirection": "*", "origin": ["same-http", "cross-http"], "subresource": "*", "expectation": "omitted"}, {"name": "secure-protocol", "expansion": "default", "source_scheme": "https", "source_context_list": "*", "delivery_type": "*", "delivery_value": "no-referrer-when-downgrade", "redirection": "*", "origin": ["same-https", "cross-https"], "subresource": "*", "expectation": "stripped-referrer"}]}, {"name": "origin", "title": "Referrer Policy is set to 'origin'", "description": "Check that all subresources in all casses get only the origin portion of the referrer URL.", "specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin", "test_expansion": [{"name": "generic", "expansion": "default", "source_scheme": "*", "source_context_list": "*", "delivery_type": "*", "delivery_value": "origin", "redirection": "*", "origin": "*", "subresource": "*", "expectation": "origin"}]}, {"name": "same-origin", "title": "Referrer Policy is set to 'same-origin'", "description": "Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.", "specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin", "test_expansion": [{"name": "same-origin-insecure", "expansion": "default", "source_scheme": "http", "source_context_list": "*", "delivery_type": "*", "delivery_value": "same-origin", "redirection": "*", "origin": "same-http", "subresource": "*", "expectation": "stripped-referrer"}, {"name": "same-origin-secure-default", "expansion": "default", "source_scheme": "https", "source_context_list": "*", "delivery_type": "*", "delivery_value": "same-origin", "redirection": "*", "origin": "same-https", "subresource": "*", "expectation": "stripped-referrer"}, {"name": "same-origin-insecure", "expansion": "override", "source_scheme": "*", "source_context_list": "*", "delivery_type": "*", "delivery_value": "same-origin", "redirection": "swap-origin", "origin": ["same-http", "same-https"], "subresource": "*", "expectation": "omitted"}, {"name": "cross-origin", "expansion": "default", "source_scheme": "*", "source_context_list": "*", "delivery_type": "*", "delivery_value": "same-origin", "redirection": "*", "origin": ["cross-http", "cross-https"], "subresource": "*", "expectation": "omitted"}]}, {"name": "origin-when-cross-origin", "title": "Referrer Policy is set to 'origin-when-cross-origin'", "description": "Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.", "specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin", "test_expansion": [{"name": "same-origin-insecure", "expansion": "default", "source_scheme": "http", "source_context_list": "*", "delivery_type": "*", "delivery_value": "origin-when-cross-origin", "redirection": "*", "origin": "same-http", "subresource": "*", "expectation": "stripped-referrer"}, {"name": "same-origin-secure-default", "expansion": "default", "source_scheme": "https", "source_context_list": "*", "delivery_type": "*", "delivery_value": "origin-when-cross-origin", "redirection": "*", "origin": "same-https", "subresource": "*", "expectation": "stripped-referrer"}, {"name": "same-origin-upgrade", "expansion": "default", "source_scheme": "http", "source_context_list": "*", "delivery_type": "*", "delivery_value": "origin-when-cross-origin", "redirection": "*", "origin": "same-https", "subresource": "*", "expectation": "origin"}, {"name": "same-origin-downgrade", "expansion": "default", "source_scheme": "https", "source_context_list": "*", "delivery_type": "*", "delivery_value": "origin-when-cross-origin", "redirection": "*", "origin": "same-http", "subresource": "*", "expectation": "origin"}, {"name": "same-origin-insecure", "expansion": "override", "source_scheme": "*", "source_context_list": "*", "delivery_type": "*", "delivery_value": "origin-when-cross-origin", "redirection": "swap-origin", "origin": ["same-http", "same-https"], "subresource": "*", "expectation": "origin"}, {"name": "cross-origin", "expansion": "default", "source_scheme": "*", "source_context_list": "*", "delivery_type": "*", "delivery_value": "origin-when-cross-origin", "redirection": "*", "origin": ["cross-http", "cross-https"], "subresource": "*", "expectation": "origin"}]}, {"name": "strict-origin", "title": "Referrer Policy is set to 'strict-origin'", "description": "Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.", "specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin", "test_expansion": [{"name": "insecure-protocol", "expansion": "default", "source_scheme": "http", "source_context_list": "*", "delivery_type": "*", "delivery_value": "strict-origin", "redirection": "*", "origin": ["same-http", "cross-http"], "subresource": "*", "expectation": "origin"}, {"name": "upgrade-protocol", "expansion": "default", "source_scheme": "http", "source_context_list": "*", "delivery_type": "*", "delivery_value": "strict-origin", "redirection": "*", "origin": ["same-https", "cross-https"], "subresource": "*", "expectation": "origin"}, {"name": "downgrade-protocol", "expansion": "default", "source_scheme": "https", "source_context_list": "*", "delivery_type": "*", "delivery_value": "strict-origin", "redirection": "*", "origin": ["same-http", "cross-http"], "subresource": "*", "expectation": "omitted"}, {"name": "secure-protocol", "expansion": "default", "source_scheme": "https", "source_context_list": "*", "delivery_type": "*", "delivery_value": "strict-origin", "redirection": "*", "origin": ["same-https", "cross-https"], "subresource": "*", "expectation": "origin"}]}, {"name": "strict-origin-when-cross-origin", "title": "Referrer Policy is set to 'strict-origin-when-cross-origin'", "description": "Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.", "specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin", "test_expansion": [{"name": "same-insecure", "expansion": "default", "source_scheme": "http", "source_context_list": "*", "delivery_type": "*", "delivery_value": "strict-origin-when-cross-origin", "redirection": "*", "origin": "same-http", "subresource": "*", "expectation": "stripped-referrer"}, {"name": "same-insecure", "expansion": "override", "source_scheme": "http", "source_context_list": "*", "delivery_type": "*", "delivery_value": "strict-origin-when-cross-origin", "redirection": "swap-origin", "origin": "same-http", "subresource": "*", "expectation": "origin"}, {"name": "cross-insecure", "expansion": "default", "source_scheme": "http", "source_context_list": "*", "delivery_type": "*", "delivery_value": "strict-origin-when-cross-origin", "redirection": "*", "origin": "cross-http", "subresource": "*", "expectation": "origin"}, {"name": "upgrade-protocol", "expansion": "default", "source_scheme": "http", "source_context_list": "*", "delivery_type": "*", "delivery_value": "strict-origin-when-cross-origin", "redirection": "*", "origin": ["same-https", "cross-https"], "subresource": "*", "expectation": "origin"}, {"name": "downgrade-protocol", "expansion": "default", "source_scheme": "https", "source_context_list": "*", "delivery_type": "*", "delivery_value": "strict-origin-when-cross-origin", "redirection": "*", "origin": ["same-http", "cross-http"], "subresource": "*", "expectation": "omitted"}, {"name": "same-secure", "expansion": "default", "source_scheme": "https", "source_context_list": "*", "delivery_type": "*", "delivery_value": "strict-origin-when-cross-origin", "redirection": "*", "origin": "same-https", "subresource": "*", "expectation": "stripped-referrer"}, {"name": "same-secure", "expansion": "override", "source_scheme": "https", "source_context_list": "*", "delivery_type": "*", "delivery_value": "strict-origin-when-cross-origin", "redirection": "swap-origin", "origin": "same-https", "subresource": "*", "expectation": "origin"}, {"name": "cross-secure", "expansion": "default", "source_scheme": "https", "source_context_list": "*", "delivery_type": "*", "delivery_value": "strict-origin-when-cross-origin", "redirection": "*", "origin": "cross-https", "subresource": "*", "expectation": "origin"}]}, {"name": "unsafe-url", "title": "Referrer Policy is set to 'unsafe-url'", "description": "Check that all sub-resources get the stripped referrer URL.", "specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url", "test_expansion": [{"name": "generic", "expansion": "default", "source_scheme": "*", "source_context_list": "*", "delivery_type": "*", "delivery_value": "unsafe-url", "redirection": "*", "origin": "*", "subresource": "*", "expectation": "stripped-referrer"}]}], "delivery_key": "referrerPolicy", "excluded_tests": [{"name": "cross-origin-workers", "expansion": "*", "source_scheme": "*", "source_context_list": "*", "redirection": "*", "delivery_type": "*", "delivery_value": "*", "origin": ["cross-http", "cross-https"], "subresource": ["worker-classic", "worker-module", "sharedworker-classic"], "expectation": "*"}, {"name": "upgraded-protocol-workers", "expansion": "*", "source_scheme": "http", "source_context_list": "*", "delivery_type": "*", "delivery_value": "*", "redirection": "*", "origin": ["same-https", "cross-https"], "subresource": ["worker-classic", "worker-module", "sharedworker-classic"], "expectation": "*"}, {"name": "mixed-content-insecure-subresources", "expansion": "*", "source_scheme": "https", "source_context_list": "*", "delivery_type": "*", "delivery_value": "*", "redirection": "*", "origin": ["same-http", "cross-http"], "subresource": "*", "expectation": "*"}, {"name": "area-tag", "expansion": "*", "source_scheme": "*", "source_context_list": "*", "delivery_type": "*", "delivery_value": "*", "redirection": "*", "origin": "*", "subresource": "area-tag", "expectation": "*"}, {"name": "worker-requests-with-swap-origin-redirect", "expansion": "*", "source_scheme": "*", "source_context_list": "*", "delivery_type": "*", "delivery_value": "*", "redirection": "swap-origin", "origin": "*", "subresource": ["worker-classic", "worker-module", "sharedworker-classic"], "expectation": "*"}, {"name": "overhead-for-redirection", "expansion": "*", "source_scheme": "*", "source_context_list": "*", "delivery_type": "*", "delivery_value": "*", "redirection": ["keep-origin", "swap-origin"], "origin": "*", "subresource": ["a-tag", "area-tag"], "expectation": "*"}, {"name": "source-https-unsupported-by-web-platform-tests-runners", "expansion": "*", "source_scheme": "https", "source_context_list": "*", "delivery_type": "*", "delivery_value": "*", "redirection": "*", "origin": "*", "subresource": "*", "expectation": "*"}, {"name": "<link rel=noreferrer>'s delivery_value should be no-referrer", "expansion": "*", "source_scheme": "*", "source_context_list": "*", "delivery_type": "rel-noref", "delivery_value": [null, "no-referrer-when-downgrade", "same-origin", "origin", "origin-when-cross-origin", "strict-origin", "strict-origin-when-cross-origin", "unsafe-url"], "redirection": "*", "origin": "*", "subresource": "*", "expectation": "*"}], "source_context_schema": {"supported_delivery_type": {"top": ["meta", "http-rp"], "iframe": ["meta", "http-rp"], "iframe-blank": ["meta"], "srcdoc": ["meta"], "worker-classic": ["http-rp"], "worker-module": ["http-rp"], "worker-classic-data": [], "worker-module-data": []}, "supported_subresource": {"top": "*", "iframe": "*", "iframe-blank": "*", "srcdoc": "*", "worker-classic": ["xhr", "fetch", "worker-classic", "worker-module"], "worker-module": ["xhr", "fetch", "worker-classic", "worker-module"], "worker-classic-data": ["xhr", "fetch"], "worker-module-data": ["xhr", "fetch"]}}, "subresource_schema": {"supported_delivery_type": {"iframe-tag": ["attr"], "img-tag": ["attr"], "script-tag": ["attr"], "a-tag": ["attr", "rel-noref"], "area-tag": ["attr"], "xhr": [], "fetch": [], "worker-module": [], "sharedworker-classic": [], "worker-classic": []}}, "source_context_list_schema": {"top": {"description": "Policy set by the top-level Document", "sourceContextList": [{"sourceContextType": "top", "policyDeliveries": ["policy"]}], "subresourcePolicyDeliveries": []}, "req": {"description": "Subresource request's policy should override Document's policy", "sourceContextList": [{"sourceContextType": "top", "policyDeliveries": ["anotherPolicy"]}], "subresourcePolicyDeliveries": ["nonNullPolicy"]}, "srcdoc-inherit": {"description": "srcdoc iframe should inherit parent Document's policy", "sourceContextList": [{"sourceContextType": "top", "policyDeliveries": ["policy"]}, {"sourceContextType": "srcdoc"}], "subresourcePolicyDeliveries": []}, "srcdoc": {"description": "srcdoc iframe's policy should override parent Document's policy", "sourceContextList": [{"sourceContextType": "top", "policyDeliveries": ["anotherPolicy"]}, {"sourceContextType": "srcdoc", "policyDeliveries": ["nonNullPolicy"]}], "subresourcePolicyDeliveries": []}, "iframe": {"description": "external iframe's policy should override parent Document's policy", "sourceContextList": [{"sourceContextType": "top", "policyDeliveries": ["anotherPolicy"]}, {"sourceContextType": "iframe", "policyDeliveries": ["policy"]}], "subresourcePolicyDeliveries": []}, "worker-classic": {"sourceContextList": [{"sourceContextType": "top", "policyDeliveries": ["anotherPolicy"]}, {"sourceContextType": "worker-classic", "policyDeliveries": ["policy"]}], "subresourcePolicyDeliveries": []}, "worker-classic-data": {"sourceContextList": [{"sourceContextType": "top", "policyDeliveries": ["anotherPolicy"]}, {"sourceContextType": "worker-classic-data", "policyDeliveries": ["policy"]}], "subresourcePolicyDeliveries": []}, "worker-module": {"sourceContextList": [{"sourceContextType": "top", "policyDeliveries": ["anotherPolicy"]}, {"sourceContextType": "worker-module", "policyDeliveries": ["policy"]}], "subresourcePolicyDeliveries": []}, "worker-module-data": {"sourceContextList": [{"sourceContextType": "top", "policyDeliveries": ["anotherPolicy"]}, {"sourceContextType": "worker-module-data", "policyDeliveries": ["policy"]}], "subresourcePolicyDeliveries": []}}, "test_expansion_schema": {"expansion": ["default", "override"], "delivery_type": ["attr", "rel-noref", "http-rp", "meta"], "delivery_value": [null, "no-referrer", "no-referrer-when-downgrade", "same-origin", "origin", "origin-when-cross-origin", "strict-origin", "strict-origin-when-cross-origin", "unsafe-url"], "origin": ["same-http", "same-https", "cross-http", "cross-https"], "source_context_list": ["top", "req", "srcdoc-inherit", "srcdoc", "iframe", "worker-classic", "worker-classic-data", "worker-module", "worker-module-data"], "source_scheme": ["http", "https"], "redirection": ["no-redirect", "keep-origin", "swap-origin"], "subresource": ["iframe-tag", "img-tag", "script-tag", "a-tag", "area-tag", "xhr", "worker-classic", "worker-module", "sharedworker-classic", "fetch"], "expectation": ["omitted", "origin", "stripped-referrer"]}}; +var SPEC_JSON = {"selection_pattern": "%(source_context_list)s.%(delivery_type)s/%(delivery_value)s/%(subresource)s/%(origin)s.%(redirection)s.%(source_scheme)s", "test_file_path_pattern": "gen/%(source_context_list)s.%(delivery_type)s/%(delivery_value)s/%(subresource)s/%(origin)s.%(redirection)s.%(source_scheme)s.html", "test_description_template": "Referrer Policy: Expects %(expectation)s for %(subresource)s to %(origin)s origin and %(redirection)s redirection from %(source_scheme)s context.", "test_page_title_template": "Referrer-Policy: %(title)s", "specification": [{"name": "unset-referrer-policy", "title": "Referrer Policy is not explicitly defined", "description": "Check that referrer URL follows no-referrer-when-downgrade policy when no explicit Referrer Policy is set.", "specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policies", "test_expansion": [{"name": "insecure-protocol", "expansion": "default", "source_scheme": "http", "source_context_list": "*", "delivery_type": "*", "delivery_value": null, "redirection": "*", "origin": ["same-http", "cross-http"], "subresource": "*", "expectation": "stripped-referrer"}, {"name": "upgrade-protocol", "expansion": "default", "source_scheme": "http", "source_context_list": "*", "delivery_type": "*", "delivery_value": null, "redirection": "*", "origin": ["same-https", "cross-https"], "subresource": "*", "expectation": "stripped-referrer"}, {"name": "downgrade-protocol", "expansion": "default", "source_scheme": "https", "source_context_list": "*", "delivery_type": "*", "delivery_value": null, "redirection": "*", "origin": ["same-http", "cross-http"], "subresource": "*", "expectation": "omitted"}, {"name": "secure-protocol", "expansion": "default", "source_scheme": "https", "source_context_list": "*", "delivery_type": "*", "delivery_value": null, "redirection": "*", "origin": ["same-https", "cross-https"], "subresource": "*", "expectation": "stripped-referrer"}]}, {"name": "no-referrer", "title": "Referrer Policy is set to 'no-referrer'", "description": "Check that sub-resource never gets the referrer URL.", "specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer", "test_expansion": [{"name": "generic", "expansion": "default", "source_scheme": "*", "source_context_list": "*", "delivery_type": "*", "delivery_value": "no-referrer", "redirection": "*", "origin": "*", "subresource": "*", "expectation": "omitted"}]}, {"name": "no-referrer-when-downgrade", "title": "Referrer Policy is set to 'no-referrer-when-downgrade'", "description": "Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.", "specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade", "test_expansion": [{"name": "insecure-protocol", "expansion": "default", "source_scheme": "http", "source_context_list": "*", "delivery_type": "*", "delivery_value": "no-referrer-when-downgrade", "redirection": "*", "origin": ["same-http", "cross-http"], "subresource": "*", "expectation": "stripped-referrer"}, {"name": "upgrade-protocol", "expansion": "default", "source_scheme": "http", "source_context_list": "*", "delivery_type": "*", "delivery_value": "no-referrer-when-downgrade", "redirection": "*", "origin": ["same-https", "cross-https"], "subresource": "*", "expectation": "stripped-referrer"}, {"name": "downgrade-protocol", "expansion": "default", "source_scheme": "https", "source_context_list": "*", "delivery_type": "*", "delivery_value": "no-referrer-when-downgrade", "redirection": "*", "origin": ["same-http", "cross-http"], "subresource": "*", "expectation": "omitted"}, {"name": "secure-protocol", "expansion": "default", "source_scheme": "https", "source_context_list": "*", "delivery_type": "*", "delivery_value": "no-referrer-when-downgrade", "redirection": "*", "origin": ["same-https", "cross-https"], "subresource": "*", "expectation": "stripped-referrer"}]}, {"name": "origin", "title": "Referrer Policy is set to 'origin'", "description": "Check that all subresources in all casses get only the origin portion of the referrer URL.", "specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin", "test_expansion": [{"name": "generic", "expansion": "default", "source_scheme": "*", "source_context_list": "*", "delivery_type": "*", "delivery_value": "origin", "redirection": "*", "origin": "*", "subresource": "*", "expectation": "origin"}]}, {"name": "same-origin", "title": "Referrer Policy is set to 'same-origin'", "description": "Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.", "specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin", "test_expansion": [{"name": "same-origin-insecure", "expansion": "default", "source_scheme": "http", "source_context_list": "*", "delivery_type": "*", "delivery_value": "same-origin", "redirection": "*", "origin": "same-http", "subresource": "*", "expectation": "stripped-referrer"}, {"name": "same-origin-secure-default", "expansion": "default", "source_scheme": "https", "source_context_list": "*", "delivery_type": "*", "delivery_value": "same-origin", "redirection": "*", "origin": "same-https", "subresource": "*", "expectation": "stripped-referrer"}, {"name": "same-origin-insecure", "expansion": "override", "source_scheme": "*", "source_context_list": "*", "delivery_type": "*", "delivery_value": "same-origin", "redirection": "swap-origin", "origin": ["same-http", "same-https"], "subresource": "*", "expectation": "omitted"}, {"name": "cross-origin", "expansion": "default", "source_scheme": "*", "source_context_list": "*", "delivery_type": "*", "delivery_value": "same-origin", "redirection": "*", "origin": ["cross-http", "cross-https"], "subresource": "*", "expectation": "omitted"}]}, {"name": "origin-when-cross-origin", "title": "Referrer Policy is set to 'origin-when-cross-origin'", "description": "Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.", "specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin", "test_expansion": [{"name": "same-origin-insecure", "expansion": "default", "source_scheme": "http", "source_context_list": "*", "delivery_type": "*", "delivery_value": "origin-when-cross-origin", "redirection": "*", "origin": "same-http", "subresource": "*", "expectation": "stripped-referrer"}, {"name": "same-origin-secure-default", "expansion": "default", "source_scheme": "https", "source_context_list": "*", "delivery_type": "*", "delivery_value": "origin-when-cross-origin", "redirection": "*", "origin": "same-https", "subresource": "*", "expectation": "stripped-referrer"}, {"name": "same-origin-upgrade", "expansion": "default", "source_scheme": "http", "source_context_list": "*", "delivery_type": "*", "delivery_value": "origin-when-cross-origin", "redirection": "*", "origin": "same-https", "subresource": "*", "expectation": "origin"}, {"name": "same-origin-downgrade", "expansion": "default", "source_scheme": "https", "source_context_list": "*", "delivery_type": "*", "delivery_value": "origin-when-cross-origin", "redirection": "*", "origin": "same-http", "subresource": "*", "expectation": "origin"}, {"name": "same-origin-insecure", "expansion": "override", "source_scheme": "*", "source_context_list": "*", "delivery_type": "*", "delivery_value": "origin-when-cross-origin", "redirection": "swap-origin", "origin": ["same-http", "same-https"], "subresource": "*", "expectation": "origin"}, {"name": "cross-origin", "expansion": "default", "source_scheme": "*", "source_context_list": "*", "delivery_type": "*", "delivery_value": "origin-when-cross-origin", "redirection": "*", "origin": ["cross-http", "cross-https"], "subresource": "*", "expectation": "origin"}]}, {"name": "strict-origin", "title": "Referrer Policy is set to 'strict-origin'", "description": "Check that non a priori insecure subresource gets only the origin portion of the referrer URL. A priori insecure subresource gets no referrer information.", "specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin", "test_expansion": [{"name": "insecure-protocol", "expansion": "default", "source_scheme": "http", "source_context_list": "*", "delivery_type": "*", "delivery_value": "strict-origin", "redirection": "*", "origin": ["same-http", "cross-http"], "subresource": "*", "expectation": "origin"}, {"name": "upgrade-protocol", "expansion": "default", "source_scheme": "http", "source_context_list": "*", "delivery_type": "*", "delivery_value": "strict-origin", "redirection": "*", "origin": ["same-https", "cross-https"], "subresource": "*", "expectation": "origin"}, {"name": "downgrade-protocol", "expansion": "default", "source_scheme": "https", "source_context_list": "*", "delivery_type": "*", "delivery_value": "strict-origin", "redirection": "*", "origin": ["same-http", "cross-http"], "subresource": "*", "expectation": "omitted"}, {"name": "secure-protocol", "expansion": "default", "source_scheme": "https", "source_context_list": "*", "delivery_type": "*", "delivery_value": "strict-origin", "redirection": "*", "origin": ["same-https", "cross-https"], "subresource": "*", "expectation": "origin"}]}, {"name": "strict-origin-when-cross-origin", "title": "Referrer Policy is set to 'strict-origin-when-cross-origin'", "description": "Check that a priori insecure subresource gets no referrer information. Otherwise, cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.", "specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-strict-origin-when-cross-origin", "test_expansion": [{"name": "same-insecure", "expansion": "default", "source_scheme": "http", "source_context_list": "*", "delivery_type": "*", "delivery_value": "strict-origin-when-cross-origin", "redirection": "*", "origin": "same-http", "subresource": "*", "expectation": "stripped-referrer"}, {"name": "same-insecure", "expansion": "override", "source_scheme": "http", "source_context_list": "*", "delivery_type": "*", "delivery_value": "strict-origin-when-cross-origin", "redirection": "swap-origin", "origin": "same-http", "subresource": "*", "expectation": "origin"}, {"name": "cross-insecure", "expansion": "default", "source_scheme": "http", "source_context_list": "*", "delivery_type": "*", "delivery_value": "strict-origin-when-cross-origin", "redirection": "*", "origin": "cross-http", "subresource": "*", "expectation": "origin"}, {"name": "upgrade-protocol", "expansion": "default", "source_scheme": "http", "source_context_list": "*", "delivery_type": "*", "delivery_value": "strict-origin-when-cross-origin", "redirection": "*", "origin": ["same-https", "cross-https"], "subresource": "*", "expectation": "origin"}, {"name": "downgrade-protocol", "expansion": "default", "source_scheme": "https", "source_context_list": "*", "delivery_type": "*", "delivery_value": "strict-origin-when-cross-origin", "redirection": "*", "origin": ["same-http", "cross-http"], "subresource": "*", "expectation": "omitted"}, {"name": "same-secure", "expansion": "default", "source_scheme": "https", "source_context_list": "*", "delivery_type": "*", "delivery_value": "strict-origin-when-cross-origin", "redirection": "*", "origin": "same-https", "subresource": "*", "expectation": "stripped-referrer"}, {"name": "same-secure", "expansion": "override", "source_scheme": "https", "source_context_list": "*", "delivery_type": "*", "delivery_value": "strict-origin-when-cross-origin", "redirection": "swap-origin", "origin": "same-https", "subresource": "*", "expectation": "origin"}, {"name": "cross-secure", "expansion": "default", "source_scheme": "https", "source_context_list": "*", "delivery_type": "*", "delivery_value": "strict-origin-when-cross-origin", "redirection": "*", "origin": "cross-https", "subresource": "*", "expectation": "origin"}]}, {"name": "unsafe-url", "title": "Referrer Policy is set to 'unsafe-url'", "description": "Check that all sub-resources get the stripped referrer URL.", "specification_url": "https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-unsafe-url", "test_expansion": [{"name": "generic", "expansion": "default", "source_scheme": "*", "source_context_list": "*", "delivery_type": "*", "delivery_value": "unsafe-url", "redirection": "*", "origin": "*", "subresource": "*", "expectation": "stripped-referrer"}]}], "delivery_key": "referrerPolicy", "excluded_tests": [{"name": "cross-origin-workers", "expansion": "*", "source_scheme": "*", "source_context_list": "*", "redirection": "*", "delivery_type": "*", "delivery_value": "*", "origin": ["cross-http", "cross-https"], "subresource": ["worker-classic", "worker-module", "sharedworker-classic", "sharedworker-module"], "expectation": "*"}, {"name": "upgraded-protocol-workers", "expansion": "*", "source_scheme": "http", "source_context_list": "*", "delivery_type": "*", "delivery_value": "*", "redirection": "*", "origin": ["same-https", "cross-https"], "subresource": ["worker-classic", "worker-module", "sharedworker-classic", "sharedworker-module"], "expectation": "*"}, {"name": "mixed-content-insecure-subresources", "expansion": "*", "source_scheme": "https", "source_context_list": "*", "delivery_type": "*", "delivery_value": "*", "redirection": "*", "origin": ["same-http", "cross-http"], "subresource": "*", "expectation": "*"}, {"name": "area-tag", "expansion": "*", "source_scheme": "*", "source_context_list": "*", "delivery_type": "*", "delivery_value": "*", "redirection": "*", "origin": "*", "subresource": "area-tag", "expectation": "*"}, {"name": "worker-requests-with-swap-origin-redirect", "expansion": "*", "source_scheme": "*", "source_context_list": "*", "delivery_type": "*", "delivery_value": "*", "redirection": "swap-origin", "origin": "*", "subresource": ["worker-classic", "worker-module", "sharedworker-classic", "sharedworker-module"], "expectation": "*"}, {"name": "overhead-for-redirection", "expansion": "*", "source_scheme": "*", "source_context_list": "*", "delivery_type": "*", "delivery_value": "*", "redirection": ["keep-origin", "swap-origin"], "origin": "*", "subresource": ["a-tag", "area-tag"], "expectation": "*"}, {"name": "source-https-unsupported-by-web-platform-tests-runners", "expansion": "*", "source_scheme": "https", "source_context_list": "*", "delivery_type": "*", "delivery_value": "*", "redirection": "*", "origin": "*", "subresource": "*", "expectation": "*"}, {"name": "<link rel=noreferrer>'s delivery_value should be no-referrer", "expansion": "*", "source_scheme": "*", "source_context_list": "*", "delivery_type": "rel-noref", "delivery_value": [null, "no-referrer-when-downgrade", "same-origin", "origin", "origin-when-cross-origin", "strict-origin", "strict-origin-when-cross-origin", "unsafe-url"], "redirection": "*", "origin": "*", "subresource": "*", "expectation": "*"}], "source_context_schema": {"supported_delivery_type": {"top": ["meta", "http-rp"], "iframe": ["meta", "http-rp"], "iframe-blank": ["meta"], "srcdoc": ["meta"], "worker-classic": ["http-rp"], "worker-module": ["http-rp"], "worker-classic-data": [], "worker-module-data": []}, "supported_subresource": {"top": "*", "iframe": "*", "iframe-blank": "*", "srcdoc": "*", "worker-classic": ["xhr", "fetch", "worker-classic", "worker-module"], "worker-module": ["xhr", "fetch", "worker-classic", "worker-module"], "worker-classic-data": ["xhr", "fetch"], "worker-module-data": ["xhr", "fetch"]}}, "subresource_schema": {"supported_delivery_type": {"iframe-tag": ["attr"], "img-tag": ["attr"], "script-tag": ["attr"], "a-tag": ["attr", "rel-noref"], "area-tag": ["attr"], "xhr": [], "fetch": [], "sharedworker-module": [], "worker-module": [], "sharedworker-classic": [], "worker-classic": []}}, "source_context_list_schema": {"top": {"description": "Policy set by the top-level Document", "sourceContextList": [{"sourceContextType": "top", "policyDeliveries": ["policy"]}], "subresourcePolicyDeliveries": []}, "req": {"description": "Subresource request's policy should override Document's policy", "sourceContextList": [{"sourceContextType": "top", "policyDeliveries": ["anotherPolicy"]}], "subresourcePolicyDeliveries": ["nonNullPolicy"]}, "srcdoc-inherit": {"description": "srcdoc iframe should inherit parent Document's policy", "sourceContextList": [{"sourceContextType": "top", "policyDeliveries": ["policy"]}, {"sourceContextType": "srcdoc"}], "subresourcePolicyDeliveries": []}, "srcdoc": {"description": "srcdoc iframe's policy should override parent Document's policy", "sourceContextList": [{"sourceContextType": "top", "policyDeliveries": ["anotherPolicy"]}, {"sourceContextType": "srcdoc", "policyDeliveries": ["nonNullPolicy"]}], "subresourcePolicyDeliveries": []}, "iframe": {"description": "external iframe's policy should override parent Document's policy", "sourceContextList": [{"sourceContextType": "top", "policyDeliveries": ["anotherPolicy"]}, {"sourceContextType": "iframe", "policyDeliveries": ["policy"]}], "subresourcePolicyDeliveries": []}, "worker-classic": {"sourceContextList": [{"sourceContextType": "top", "policyDeliveries": ["anotherPolicy"]}, {"sourceContextType": "worker-classic", "policyDeliveries": ["policy"]}], "subresourcePolicyDeliveries": []}, "worker-classic-data": {"sourceContextList": [{"sourceContextType": "top", "policyDeliveries": ["anotherPolicy"]}, {"sourceContextType": "worker-classic-data", "policyDeliveries": ["policy"]}], "subresourcePolicyDeliveries": []}, "worker-module": {"sourceContextList": [{"sourceContextType": "top", "policyDeliveries": ["anotherPolicy"]}, {"sourceContextType": "worker-module", "policyDeliveries": ["policy"]}], "subresourcePolicyDeliveries": []}, "worker-module-data": {"sourceContextList": [{"sourceContextType": "top", "policyDeliveries": ["anotherPolicy"]}, {"sourceContextType": "worker-module-data", "policyDeliveries": ["policy"]}], "subresourcePolicyDeliveries": []}}, "test_expansion_schema": {"expansion": ["default", "override"], "delivery_type": ["attr", "rel-noref", "http-rp", "meta"], "delivery_value": [null, "no-referrer", "no-referrer-when-downgrade", "same-origin", "origin", "origin-when-cross-origin", "strict-origin", "strict-origin-when-cross-origin", "unsafe-url"], "origin": ["same-http", "same-https", "cross-http", "cross-https"], "source_context_list": ["top", "req", "srcdoc-inherit", "srcdoc", "iframe", "worker-classic", "worker-classic-data", "worker-module", "worker-module-data"], "source_scheme": ["http", "https"], "redirection": ["no-redirect", "keep-origin", "swap-origin"], "subresource": ["iframe-tag", "img-tag", "script-tag", "a-tag", "area-tag", "xhr", "worker-classic", "worker-module", "sharedworker-classic", "sharedworker-module", "fetch"], "expectation": ["omitted", "origin", "stripped-referrer"]}}; diff --git a/tests/wpt/web-platform-tests/referrer-policy/spec.src.json b/tests/wpt/web-platform-tests/referrer-policy/spec.src.json index b0e07eb1328..d32ee80a8d2 100644 --- a/tests/wpt/web-platform-tests/referrer-policy/spec.src.json +++ b/tests/wpt/web-platform-tests/referrer-policy/spec.src.json @@ -544,7 +544,8 @@ "subresource": [ "worker-classic", "worker-module", - "sharedworker-classic" + "sharedworker-classic", + "sharedworker-module" ], "expectation": "*" }, @@ -563,7 +564,8 @@ "subresource": [ "worker-classic", "worker-module", - "sharedworker-classic" + "sharedworker-classic", + "sharedworker-module" ], "expectation": "*" }, @@ -606,7 +608,8 @@ "subresource": [ "worker-classic", "worker-module", - "sharedworker-classic" + "sharedworker-classic", + "sharedworker-module" ], "expectation": "*" }, @@ -734,6 +737,7 @@ ], "xhr": [], "fetch": [], + "sharedworker-module": [], "worker-module": [], "sharedworker-classic": [], "worker-classic": [] @@ -944,6 +948,7 @@ "worker-classic", "worker-module", "sharedworker-classic", + "sharedworker-module", "fetch" ], "expectation": [ diff --git a/tests/wpt/web-platform-tests/svg/animations/seeking-events-1.html b/tests/wpt/web-platform-tests/svg/animations/seeking-events-1.html new file mode 100644 index 00000000000..8a93b45aa19 --- /dev/null +++ b/tests/wpt/web-platform-tests/svg/animations/seeking-events-1.html @@ -0,0 +1,24 @@ +<!DOCTYPE html> +<title>Seeking forwards does not dispatch events for skipped elements</title> +<script src="/resources/testharness.js"></script> +<script src="/resources/testharnessreport.js"></script> +<svg> + <rect width="50" height="100" fill="red"> + <set id="anim1" attributeName="fill" to="green" begin="5s" dur="1s" repeatCount="2" fill="freeze"/> + </rect> + <rect width="50" height="100" x="50" fill="red"> + <set id="anim2" attributeName="fill" to="green" begin="9s" dur="11s"/> + </rect> +</svg> +<script> + const SMIL_EVENTS = ['beginEvent', 'repeatEvent', 'endEvent']; + + promise_test(function(t) { + let svg = document.querySelector('svg'); + svg.pauseAnimations(); + svg.setCurrentTime(10); + new EventWatcher(t, document.getElementById('anim1'), SMIL_EVENTS); + let anim2_watcher = new EventWatcher(t, document.getElementById('anim2'), SMIL_EVENTS); + return anim2_watcher.wait_for('beginEvent'); + }); +</script> diff --git a/tests/wpt/web-platform-tests/svg/animations/seeking-events-2.html b/tests/wpt/web-platform-tests/svg/animations/seeking-events-2.html new file mode 100644 index 00000000000..4bfe05b84d8 --- /dev/null +++ b/tests/wpt/web-platform-tests/svg/animations/seeking-events-2.html @@ -0,0 +1,28 @@ +<!DOCTYPE html> +<title>Seeking backwards dispatches 'endEvent' if the element is not active at the seeked-to time</title> +<script src="/resources/testharness.js"></script> +<script src="/resources/testharnessreport.js"></script> +<svg> + <rect width="50" height="100" fill="red"> + <set id="anim1" attributeName="fill" to="green" begin="5s" dur="1s" repeatCount="2" fill="freeze"/> + </rect> + <rect width="50" height="100" x="50" fill="green"> + <set id="anim2" attributeName="fill" to="red" begin="9s" dur="11s"/> + </rect> +</svg> +<script> + const SMIL_EVENTS = ['beginEvent', 'repeatEvent', 'endEvent']; + + promise_test(function(t) { + let svg = document.querySelector('svg'); + svg.pauseAnimations(); + svg.setCurrentTime(10); + let anim1_watcher = new EventWatcher(t, document.getElementById('anim1'), SMIL_EVENTS); + let anim2_watcher = new EventWatcher(t, document.getElementById('anim2'), SMIL_EVENTS); + return anim2_watcher.wait_for('beginEvent').then(() => { + svg.setCurrentTime(5.5); + return Promise.all([anim1_watcher.wait_for('beginEvent'), + anim2_watcher.wait_for('endEvent')]); + }); + }); +</script> diff --git a/tests/wpt/web-platform-tests/svg/animations/seeking-events-3.html b/tests/wpt/web-platform-tests/svg/animations/seeking-events-3.html new file mode 100644 index 00000000000..0a8530c2127 --- /dev/null +++ b/tests/wpt/web-platform-tests/svg/animations/seeking-events-3.html @@ -0,0 +1,27 @@ +<!DOCTYPE html> +<title>Seeking backwards does not dispatch events for skipped elements</title> +<script src="/resources/testharness.js"></script> +<script src="/resources/testharnessreport.js"></script> +<svg> + <rect width="50" height="100" fill="green"> + <set id="anim1" attributeName="fill" to="red" begin="5s" dur="1s" repeatCount="2" fill="freeze"/> + </rect> + <rect width="50" height="100" x="50" fill="green"> + <set id="anim2" attributeName="fill" to="red" begin="9s" dur="11s"/> + </rect> +</svg> +<script> + const SMIL_EVENTS = ['beginEvent', 'repeatEvent', 'endEvent']; + + promise_test(function(t) { + let svg = document.querySelector('svg'); + svg.pauseAnimations(); + svg.setCurrentTime(10); + new EventWatcher(t, document.getElementById('anim1'), SMIL_EVENTS); + let anim2_watcher = new EventWatcher(t, document.getElementById('anim2'), SMIL_EVENTS); + return anim2_watcher.wait_for('beginEvent').then(() => { + svg.setCurrentTime(4); + return anim2_watcher.wait_for('endEvent'); + }); + }); +</script> diff --git a/tests/wpt/web-platform-tests/svg/animations/seeking-events-4.html b/tests/wpt/web-platform-tests/svg/animations/seeking-events-4.html new file mode 100644 index 00000000000..5877f0df3aa --- /dev/null +++ b/tests/wpt/web-platform-tests/svg/animations/seeking-events-4.html @@ -0,0 +1,27 @@ +<!DOCTYPE html> +<title>Seeking forwards dispatches 'endEvent' if the element is not active at the seeked-to time</title> +<script src="/resources/testharness.js"></script> +<script src="/resources/testharnessreport.js"></script> +<svg> + <rect width="50" height="100" fill="red"> + <set id="anim1" attributeName="fill" to="green" begin="5s" dur="1s" repeatCount="2" fill="freeze"/> + </rect> + <rect width="50" height="100" x="50" fill="green"> + <set id="anim2" attributeName="fill" to="red" begin="9s" dur="2s"/> + </rect> +</svg> +<script> + const SMIL_EVENTS = ['beginEvent', 'repeatEvent', 'endEvent']; + + promise_test(function(t) { + let svg = document.querySelector('svg'); + svg.pauseAnimations(); + svg.setCurrentTime(5.5); + let anim1_watcher = new EventWatcher(t, document.getElementById('anim1'), SMIL_EVENTS); + new EventWatcher(t, document.getElementById('anim2'), SMIL_EVENTS); + return anim1_watcher.wait_for('beginEvent').then(() => { + svg.setCurrentTime(11); + return anim1_watcher.wait_for('endEvent'); + }); + }); +</script> diff --git a/tests/wpt/web-platform-tests/svg/animations/seeking-events-5.html b/tests/wpt/web-platform-tests/svg/animations/seeking-events-5.html new file mode 100644 index 00000000000..8d660be615f --- /dev/null +++ b/tests/wpt/web-platform-tests/svg/animations/seeking-events-5.html @@ -0,0 +1,25 @@ +<!DOCTYPE html> +<title>Seeking forwards does not dispatch 'repeatEvent'</title> +<script src="/resources/testharness.js"></script> +<script src="/resources/testharnessreport.js"></script> +<svg> + <rect width="100" height="100" fill="red"> + <set id="anim1" attributeName="fill" to="green" begin="5s" dur="1s" repeatCount="2" fill="freeze"/> + </rect> +</svg> +<script> + const SMIL_EVENTS = ['beginEvent', 'repeatEvent', 'endEvent']; + + promise_test(function(t) { + let svg = document.querySelector('svg'); + svg.pauseAnimations(); + svg.setCurrentTime(5.5); + let anim1_watcher = new EventWatcher(t, document.getElementById('anim1'), SMIL_EVENTS); + return anim1_watcher.wait_for('beginEvent').then(() => { + svg.setCurrentTime(6.5); + return new Promise(resolve => { + t.step_timeout(resolve); + }); + }); + }); +</script> diff --git a/tests/wpt/web-platform-tests/svg/animations/seeking-events-6.html b/tests/wpt/web-platform-tests/svg/animations/seeking-events-6.html new file mode 100644 index 00000000000..05dfece67ac --- /dev/null +++ b/tests/wpt/web-platform-tests/svg/animations/seeking-events-6.html @@ -0,0 +1,25 @@ +<!DOCTYPE html> +<title>Seeking backwards does not dispatch 'repeatEvent'</title> +<script src="/resources/testharness.js"></script> +<script src="/resources/testharnessreport.js"></script> +<svg> + <rect width="100" height="100" fill="red"> + <set id="anim1" attributeName="fill" to="green" begin="5s" dur="1s" repeatCount="2" fill="freeze"/> + </rect> +</svg> +<script> + const SMIL_EVENTS = ['beginEvent', 'repeatEvent', 'endEvent']; + + promise_test(function(t) { + let svg = document.querySelector('svg'); + svg.pauseAnimations(); + svg.setCurrentTime(6.5); + let anim1_watcher = new EventWatcher(t, document.getElementById('anim1'), SMIL_EVENTS); + return anim1_watcher.wait_for('beginEvent').then(() => { + svg.setCurrentTime(5.5); + return new Promise(resolve => { + t.step_timeout(resolve); + }); + }); + }); +</script> diff --git a/tests/wpt/web-platform-tests/svg/animations/seeking-events-7.html b/tests/wpt/web-platform-tests/svg/animations/seeking-events-7.html new file mode 100644 index 00000000000..b3804f84cba --- /dev/null +++ b/tests/wpt/web-platform-tests/svg/animations/seeking-events-7.html @@ -0,0 +1,23 @@ +<!DOCTYPE html> +<title>Seeking forwards to a new interval dispatches both 'endEvent' and 'beginEvent'</title> +<script src="/resources/testharness.js"></script> +<script src="/resources/testharnessreport.js"></script> +<svg> + <rect width="100" height="100" fill="red"> + <set id="anim1" attributeName="fill" to="green" begin="2s; 6s" dur="1s" repeatCount="2" fill="freeze"/> + </rect> +</svg> +<script> + const SMIL_EVENTS = ['beginEvent', 'repeatEvent', 'endEvent']; + + promise_test(function(t) { + let svg = document.querySelector('svg'); + svg.pauseAnimations(); + svg.setCurrentTime(2.5); + let anim1_watcher = new EventWatcher(t, document.getElementById('anim1'), SMIL_EVENTS); + return anim1_watcher.wait_for('beginEvent').then(() => { + svg.setCurrentTime(7.5); + return anim1_watcher.wait_for(['endEvent', 'beginEvent']); + }); + }); +</script> diff --git a/tests/wpt/web-platform-tests/svg/animations/seeking-events-8.html b/tests/wpt/web-platform-tests/svg/animations/seeking-events-8.html new file mode 100644 index 00000000000..f679f2f06fb --- /dev/null +++ b/tests/wpt/web-platform-tests/svg/animations/seeking-events-8.html @@ -0,0 +1,23 @@ +<!DOCTYPE html> +<title>Seeking backwards to a new interval dispatches both 'endEvent' and 'beginEvent'</title> +<script src="/resources/testharness.js"></script> +<script src="/resources/testharnessreport.js"></script> +<svg> + <rect width="100" height="100" fill="red"> + <set id="anim1" attributeName="fill" to="green" begin="2s; 6s" dur="1s" repeatCount="2" fill="freeze"/> + </rect> +</svg> +<script> + const SMIL_EVENTS = ['beginEvent', 'repeatEvent', 'endEvent']; + + promise_test(function(t) { + let svg = document.querySelector('svg'); + svg.pauseAnimations(); + svg.setCurrentTime(6.5); + let anim1_watcher = new EventWatcher(t, document.getElementById('anim1'), SMIL_EVENTS); + return anim1_watcher.wait_for('beginEvent').then(() => { + svg.setCurrentTime(2.5); + return anim1_watcher.wait_for(['endEvent', 'beginEvent']); + }); + }); +</script> diff --git a/tests/wpt/web-platform-tests/trusted-types/TrustedTypePolicy-CSP.tentative.html b/tests/wpt/web-platform-tests/trusted-types/TrustedTypePolicy-CSP.tentative.html deleted file mode 100644 index 3a56546151e..00000000000 --- a/tests/wpt/web-platform-tests/trusted-types/TrustedTypePolicy-CSP.tentative.html +++ /dev/null @@ -1,27 +0,0 @@ -<!DOCTYPE html> -<script src="/resources/testharness.js" ></script> -<script src="/resources/testharnessreport.js"></script> -<script src="support/helper.sub.js"></script> - -<meta http-equiv="Content-Security-Policy" content="trusted-types SomeName JustOneMoreName"> -<body> -<script> - // Allowed name test - test(t => { - let policy = window.trustedTypes.createPolicy('SomeName', { createHTML: s => s } ); - assert_equals(policy.name, 'SomeName'); - }, "Allowed-name policy creation works."); - - // Another allowed name test - test(t => { - let policy = window.trustedTypes.createPolicy('JustOneMoreName', { createHTML: s => s } ); - assert_equals(policy.name, 'JustOneMoreName'); - }, "Another allowed-name policy creation works."); - - // Non-allowed names test - test(t => { - assert_throws_js(TypeError, _ => { - window.trustedTypes.createPolicy('SomeOtherName', { createURL: s => s } ); - }); - }, "Non-allowed name policy creation throws."); -</script> diff --git a/tests/wpt/web-platform-tests/upgrade-insecure-requests/support/testharness-helper.sub.js b/tests/wpt/web-platform-tests/upgrade-insecure-requests/support/testharness-helper.sub.js index da20d2644b3..c60015433b9 100644 --- a/tests/wpt/web-platform-tests/upgrade-insecure-requests/support/testharness-helper.sub.js +++ b/tests/wpt/web-platform-tests/upgrade-insecure-requests/support/testharness-helper.sub.js @@ -189,7 +189,7 @@ const testMap = { "shared-worker": test => promise_test( - () => requestViaSharedWorker(test.url), test.name), + () => requestViaSharedWorker(test.url, {}), test.name), "audio-worklet": test => promise_test( diff --git a/tests/wpt/web-platform-tests/video-raf/META.yml b/tests/wpt/web-platform-tests/video-raf/META.yml new file mode 100644 index 00000000000..44c3187495d --- /dev/null +++ b/tests/wpt/web-platform-tests/video-raf/META.yml @@ -0,0 +1,3 @@ +spec: https://wicg.github.io/video-rag/ +suggested_reviewers: + - tguilbert
\ No newline at end of file diff --git a/tests/wpt/web-platform-tests/video-raf/README.md b/tests/wpt/web-platform-tests/video-raf/README.md new file mode 100644 index 00000000000..a5272939964 --- /dev/null +++ b/tests/wpt/web-platform-tests/video-raf/README.md @@ -0,0 +1,11 @@ +# HTMLVideoElement.requestAnimationFrame specification Tests + +The HTMLVideoElement.requestAnimationFrame specification is available here: https://wicg.github.io/video-raf + +GitHub repository: https://github.com/WICG/video-raf + +File an issue: https://github.com/wicg/video-raf/issues/new + +## Status of these tests + +Theses tests are still basic. The specification is still WIP, and rendering tests will be added to ensure consistenty of behavior/timing relative to other [AnimationFrameProviders](https://html.spec.whatwg.org/multipage/imagebitmap-and-animations.html#animation-frames) (e.g. window.rAF).
\ No newline at end of file diff --git a/tests/wpt/web-platform-tests/video-raf/video-request-animation-frame-parallel.html b/tests/wpt/web-platform-tests/video-raf/video-request-animation-frame-parallel.html new file mode 100644 index 00000000000..35fe4575f3b --- /dev/null +++ b/tests/wpt/web-platform-tests/video-raf/video-request-animation-frame-parallel.html @@ -0,0 +1,54 @@ +<!DOCTYPE html> +<html> +<title>Test having multiple video.rAF callbacks in flight for a single element.</title> +<script src="/resources/testharness.js"></script> +<script src="/resources/testharnessreport.js"></script> +<script src="/common/media.js"></script> +<script> + +async_test(function(t) { + let video = document.createElement('video'); + + let firstTime; + let firstMetadata; + + video.requestAnimationFrame(t.step_func((time, metadata) => { + firstTime = time; + firstMetadata = metadata; + })); + + video.requestAnimationFrame(t.step_func_done((time, metadata) => { + assert_equals(firstTime, time); + assert_object_equals(firstMetadata, metadata); + })); + + video.src = getVideoURI('/media/movie_5'); + video.play(); + +}, 'Test callbacks get the same information.'); + +async_test(function(t) { + let video = document.createElement('video'); + + let secondCallbackId; + + video.requestAnimationFrame( + t.step_func(_ => { video.cancelAnimationFrame(secondCallbackId); }) + ); + + secondCallbackId = video.requestAnimationFrame( + t.step_func(_ => { + assert_unreached("Cancelled callbacks shouldn't be executed") + }) + ); + + // NOTE: This callback should be executed last. + video.requestAnimationFrame( + t.step_func_done() + ); + + video.src = getVideoURI('/media/movie_5'); + video.play(); +}, 'Test we can cancel callbacks from callbacks.'); +</script> +</html> diff --git a/tests/wpt/web-platform-tests/video-raf/video-request-animation-frame-repeating.html b/tests/wpt/web-platform-tests/video-raf/video-request-animation-frame-repeating.html new file mode 100644 index 00000000000..d98f39f96b1 --- /dev/null +++ b/tests/wpt/web-platform-tests/video-raf/video-request-animation-frame-repeating.html @@ -0,0 +1,61 @@ +<!DOCTYPE html> +<html> +<title>Test repeatedly chaining video.rAF() callbacks.</title> +<script src="/resources/testharness.js"></script> +<script src="/resources/testharnessreport.js"></script> +<script src="/common/media.js"></script> +<script> + +async_test(function(t) { + let video = document.createElement('video'); + + let firstTime; + video.requestAnimationFrame(t.step_func((time) => { + firstTime = time; + + // Queue up a callback and make sure it's not immediately executed. + let secondTime; + video.requestAnimationFrame(t.step_func((time) => { + secondTime = time; + assert_greater_than(secondTime, firstTime, "Callbacks should be executed on the next frame"); + })) + + // Queue up a second callback, and make sure it's called at the same time + // as the one we just queued up. + video.requestAnimationFrame(t.step_func_done((time) => { + assert_equals(time, secondTime, "Callbacks queued together should be called at the same time"); + })) + + })); + + video.src = getVideoURI('/media/movie_5'); + video.play(); + +}, 'Test new callbacks are only called on the next frame.'); + +async_test(function(t) { + let video = document.createElement('video'); + + let numberOfCallsLeft = 10; + let lastPresentedFrames = -1; + + function frameNumberVerifier(time, metadata) { + assert_greater_than(metadata.presentedFrames, lastPresentedFrames, "presentedFrames should be monotonically increasing"); + + lastPresentedFrames = metadata.presentedFrames; + + if (--numberOfCallsLeft) { + t.done() + } else { + video.requestAnimationFrame(t.step_func(frameNumberVerifier)); + } + } + + video.requestAnimationFrame(t.step_func(frameNumberVerifier)); + + video.src = getVideoURI('/media/movie_5'); + video.play(); + +}, 'Test chaining calls to video.rAF.'); +</script> +</html> diff --git a/tests/wpt/web-platform-tests/video-raf/video-request-animation-frame.html b/tests/wpt/web-platform-tests/video-raf/video-request-animation-frame.html new file mode 100644 index 00000000000..195f5edbe94 --- /dev/null +++ b/tests/wpt/web-platform-tests/video-raf/video-request-animation-frame.html @@ -0,0 +1,77 @@ +<!DOCTYPE html> +<html> +<title>Test the basics of the video.requestAnimationFrame() API.</title> +<script src="/resources/testharness.js"></script> +<script src="/resources/testharnessreport.js"></script> +<script src="/common/media.js"></script> +<script> +var testVideo = { + url: getVideoURI('/media/movie_5'), + height: 240, + width: 320, +} + +async_test(function(t) { + let video = document.createElement('video'); + + let id = video.requestAnimationFrame( + t.step_func_done((time, metadata) => { + assert_true(time > 0); + assert_equals(metadata.height, testVideo.height); + assert_equals(metadata.width, testVideo.width); + }) + ); + + assert_true(id > 0); + + video.src = testVideo.url; + video.play(); + +}, 'Test we can register a video.rAF callback.'); + + +async_test(function(t) { + let video = document.createElement('video'); + + let id = video.requestAnimationFrame( + t.step_func(_ => { + assert_unreached("Cancelled callbacks shouldn't be executed") + }) + ); + + video.cancelAnimationFrame(id); + + video.requestAnimationFrame( + t.step_func(_ => { + // At this point, the other callback shouldn't have fired, but + // give it some more time and really make sure it doesn't, by going + // throught the event loop once more. + t.step_timeout(() => { t.done(); }); + }) + ); + + video.src = testVideo.url; + video.play(); +}, 'Test we can cancel a video.rAF request.'); + +test(function(t) { + let video = document.createElement('video'); + + // requestAnimationFrame() expects 1 function as a parameter. + assert_throws(new TypeError(), _ => { video.requestAnimationFrame() } ); + assert_throws(new TypeError(), _ => { video.requestAnimationFrame(0) }); + assert_throws(new TypeError(), _ => { video.requestAnimationFrame("foo") }); + + // cancelAnimationFrame() expects 1 number as a parameter + assert_throws(new TypeError(), _ => { video.cancelAnimationFrame() } ); + + // Invalid calls are just noops + video.cancelAnimationFrame(_ => {}); + video.cancelAnimationFrame(NaN); + video.cancelAnimationFrame("foo"); + video.cancelAnimationFrame(12345); + video.cancelAnimationFrame(-1); + +}, 'Test invalid calls to the video.rAF API.'); +</script> +</html> diff --git a/tests/wpt/web-platform-tests/web-animations/interfaces/Animation/commitStyles.html b/tests/wpt/web-platform-tests/web-animations/interfaces/Animation/commitStyles.html index 8d45cd65199..ca7d6410d0a 100644 --- a/tests/wpt/web-platform-tests/web-animations/interfaces/Animation/commitStyles.html +++ b/tests/wpt/web-platform-tests/web-animations/interfaces/Animation/commitStyles.html @@ -128,7 +128,23 @@ test(t => { div.style.setProperty('--target', '1'); assert_numeric_style_equals(getComputedStyle(div).opacity, 0.5); -}, 'Commits variables as their computed values'); +}, 'Commits variable references as their computed values'); + + +test(t => { + const div = createDiv(t); + div.style.setProperty('--target', '0.5'); + div.style.opacity = 'var(--target)'; + const animation = div.animate( + { '--target': 0.8 }, + { duration: 1, fill: 'forwards' } + ); + animation.finish(); + animation.commitStyles(); + animation.cancel(); + + assert_numeric_style_equals(getComputedStyle(div).opacity, 0.8); +}, 'Commits custom variables'); test(t => { const div = createDiv(t); diff --git a/tests/wpt/web-platform-tests/web-animations/timing-model/animations/finishing-an-animation.html b/tests/wpt/web-platform-tests/web-animations/timing-model/animations/finishing-an-animation.html index b91eacfb689..5a41abd7b08 100644 --- a/tests/wpt/web-platform-tests/web-animations/timing-model/animations/finishing-an-animation.html +++ b/tests/wpt/web-platform-tests/web-animations/timing-model/animations/finishing-an-animation.html @@ -300,5 +300,31 @@ promise_test(async t => { 'finish event should be fired for the animation on an orphaned element'); }, 'Finishing an animation fires finish event on orphaned element'); +promise_test(async t => { + const animation = createDiv(t).animate(null, 100 * MS_PER_SEC); + await animation.ready; + + const originalFinishPromise = animation.finished; + + animation.cancel(); + assert_equals(animation.startTime, null); + assert_equals(animation.currentTime, null); + + const resolvedFinishPromise = animation.finished; + assert_true(originalFinishPromise != resolvedFinishPromise, + 'Canceling an animation should create a new finished promise'); + + animation.finish(); + assert_equals(animation.playState, 'finished', + 'The play state of a canceled animation should become ' + + '"finished"'); + assert_times_equal(animation.startTime, + animation.timeline.currentTime - 100 * MS_PER_SEC, + 'The start time of a finished animation should be set'); + assert_times_equal(animation.currentTime, 100000, + 'Hold time should be set to end boundary of the animation'); + +}, 'Finishing a canceled animation sets the current and start times'); + </script> </body> diff --git a/tests/wpt/web-platform-tests/web-animations/timing-model/animations/pausing-an-animation.html b/tests/wpt/web-platform-tests/web-animations/timing-model/animations/pausing-an-animation.html index bcec609d142..4884163c1d3 100644 --- a/tests/wpt/web-platform-tests/web-animations/timing-model/animations/pausing-an-animation.html +++ b/tests/wpt/web-platform-tests/web-animations/timing-model/animations/pausing-an-animation.html @@ -89,5 +89,31 @@ promise_test(async t => { 'Animation.currentTime is unchanged after pausing'); }, 'The animation\'s current time remains fixed after pausing'); + +promise_test(async t => { + + const animation = createDiv(t).animate(null, 100 * MS_PER_SEC); + + const originalReadyPromise = animation.ready; + animation.cancel(); + assert_equals(animation.startTime, null); + assert_equals(animation.currentTime, null); + + const readyPromise = animation.ready; + assert_true(originalReadyPromise != readyPromise, + 'Canceling an animation should create a new ready promise'); + + animation.pause(); + assert_equals(animation.playState, 'paused', + 'Pausing a canceled animation should update the play state'); + assert_true(animation.pending, 'animation should be pause-pending'); + await animation.ready; + assert_false(animation.pending, + 'animation should no longer be pause-pending'); + assert_equals(animation.startTime, null, 'start time should be unresolved'); + assert_equals(animation.currentTime, 0, 'current time should be set to zero'); + +}, 'Pausing a canceled animation sets the current time'); + </script> </body> diff --git a/tests/wpt/web-platform-tests/web-animations/timing-model/animations/playing-an-animation.html b/tests/wpt/web-platform-tests/web-animations/timing-model/animations/playing-an-animation.html index 1477261e6bc..608e881e751 100644 --- a/tests/wpt/web-platform-tests/web-animations/timing-model/animations/playing-an-animation.html +++ b/tests/wpt/web-platform-tests/web-animations/timing-model/animations/playing-an-animation.html @@ -138,5 +138,40 @@ promise_test(async t => { assert_time_equals_literal(animation.currentTime, 100 * MS_PER_SEC); }, 'A pending playback rate is used when determining auto-rewind behavior'); +promise_test(async t => { + const animation = createDiv(t).animate(null, 100 * MS_PER_SEC); + animation.cancel(); + assert_equals(animation.startTime, null, + 'Start time should be unresolved'); + + animation.play(); + assert_true(animation.pending, 'Animation should be play-pending'); + + await animation.ready; + + assert_false(animation.pending, 'animation should no longer be pending'); + assert_times_equal(animation.startTime, animation.timeline.currentTime, + 'The start time of the playing animation should be set'); +}, 'Playing a canceled animation sets the start time'); + +promise_test(async t => { + const animation = createDiv(t).animate(null, 100 * MS_PER_SEC); + animation.playbackRate = -1; + // animation.currentTime = 100 * MS_PER_SEC; + animation.cancel(); + assert_equals(animation.startTime, null, + 'Start time should be unresolved'); + + animation.play(); + assert_true(animation.pending, 'Animation should be play-pending'); + + await animation.ready; + + assert_false(animation.pending, 'Animation should no longer be pending'); + assert_times_equal(animation.startTime, + animation.timeline.currentTime + 100 * MS_PER_SEC, + 'The start time of a playing animation should be set'); +}, 'Playing a canceled animation backwards sets the start time'); + </script> </body> diff --git a/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-audioworklet-interface/process-getter.https.html b/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-audioworklet-interface/process-getter.https.html new file mode 100644 index 00000000000..a4c59123a10 --- /dev/null +++ b/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-audioworklet-interface/process-getter.https.html @@ -0,0 +1,23 @@ +<!doctype html> +<title>Test use of 'process' getter for AudioWorkletProcessor callback</title> +<script src=/resources/testharness.js></script> +<script src=/resources/testharnessreport.js></script> +<script> +const do_test = async (node_name) => { + const context = new AudioContext(); + const filePath = `processors/${node_name}-processor.js`; + await context.audioWorklet.addModule(filePath); + const node = new AudioWorkletNode(context, node_name); + const event = await new Promise((resolve) => { + node.port.onmessage = resolve; + }); + assert_equals(event.data.message, "done"); +}; + +// Includes testing for https://github.com/WebAudio/web-audio-api/pull/2104 +promise_test(async () => do_test('process-getter-test-prototype'), + "'process' getter on prototype"); + +promise_test(async () => do_test('process-getter-test-instance'), + "'process' getter on instance"); +</script> diff --git a/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-audioworklet-interface/process-parameters.https.html b/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-audioworklet-interface/process-parameters.https.html new file mode 100644 index 00000000000..4c6a10dfab3 --- /dev/null +++ b/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-audioworklet-interface/process-parameters.https.html @@ -0,0 +1,87 @@ +<!doctype html> +<title>Test parameters of process() AudioWorkletProcessor callback</title> +<script src=/resources/testharness.js></script> +<script src=/resources/testharnessreport.js></script> +<script> +var context; +promise_setup(async (t) => { + context = new AudioContext(); + const filePath = 'processors/process-parameter-test-processor.js'; + await context.audioWorklet.addModule(filePath); +}); + +const get_parameters = async (node, options) => { + const event = await new Promise((resolve) => { + node.port.onmessage = resolve; + }); + const inputs = event.data.inputs; + assert_equals(inputs.length, options.numberOfInputs, 'inputs length'); + const outputs = event.data.outputs; + assert_equals(outputs.length, options.numberOfOutputs, 'outputs length'); + for (let port = 0; port < inputs.length; ++port) { + for (let channel = 0; channel < inputs[port].length; ++channel) { + assert_equals(inputs[port][channel].length, 128, + `inputs[${port}][${channel}].length`); + } + } + for (let port = 0; port < outputs.length; ++port) { + for (let channel = 0; channel < outputs[port].length; ++channel) { + assert_equals(outputs[port][channel].length, 128, + `outputs[${port}][${channel}].length`); + } + } + return event.data; +}; + +promise_test(async (t) => { + const options = { + numberOfInputs: 3, + numberOfOutputs: 0 + }; + // Connect a source so that one channel of one input is active. + context.suspend(); + const source = new ConstantSourceNode(context); + source.start(); + const merger = new ChannelMergerNode(context, {numberOfInputs: 2}); + const active_channel_index = merger.numberOfInputs - 1; + source.connect(merger, 0, active_channel_index); + const node = new AudioWorkletNode(context, 'process-parameter-test', options); + const active_port_index = options.numberOfInputs - 1; + merger.connect(node, 0, active_port_index); + context.resume(); + const {inputs} = await get_parameters(node, options); + for (let port = 0; port < inputs.length - 1; ++port) { + if (port != active_port_index) { + assert_equals(inputs[port].length, 0, `inputs[${port}].length`); + } + } + const active_input = inputs[active_port_index]; + assert_equals(active_input.length, merger.numberOfInputs, + 'active_input.length'); + for (let channel = 0; channel < active_input.length; ++channel) { + let expected = channel == active_channel_index ? 1.0 : 0.0; + for (let sample = 0; sample < inputs.length; ++sample) { + assert_equals(active_input[channel][sample], expected, + `active_input[${channel}][${sample}]`); + } + } +}, '3 inputs; 0 outputs'); + +promise_test(async (t) => { + const options = { + numberOfInputs: 0, + numberOfOutputs: 3 + }; + const node = new AudioWorkletNode(context, 'process-parameter-test', options); + const {outputs} = await get_parameters(node, options); + for (let port = 0; port < outputs.length; ++port) { + assert_equals(outputs[port].length, 1, `outputs[${port}].length`); + for (let channel = 0; channel < outputs[port].length; ++channel) { + for (let sample = 0; sample < outputs.length; ++sample) { + assert_equals(outputs[port][channel][sample], 0.0, + `outputs[${port}][${channel}][${sample}]`); + } + } + } +}, '0 inputs; 3 outputs'); +</script> diff --git a/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-audioworklet-interface/processor-construction-port.https.html b/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-audioworklet-interface/processor-construction-port.https.html new file mode 100644 index 00000000000..6f1aa592250 --- /dev/null +++ b/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-audioworklet-interface/processor-construction-port.https.html @@ -0,0 +1,61 @@ +<!doctype html> +<title>Test processor port assignment on processor callback function construction</title> +<script src=/resources/testharness.js></script> +<script src=/resources/testharnessreport.js></script> +<script> +// https://webaudio.github.io/web-audio-api/#AudioWorkletProcessor-instantiation + +const get_context_for_node_name = async (node_name) => { + const context = new AudioContext(); + const filePath = `processors/construction-port-${node_name}.js`; + await context.audioWorklet.addModule(filePath); + return context; +} + +const test_throws = async ({node_name, thrower} = {}) => { + const context = await get_context_for_node_name(node_name); + const node = new AudioWorkletNode(context, node_name); + const event = await new Promise((resolve) => { + node.port.onmessage = resolve; + }); + assert_true(event.data.threw, `${thrower} should throw`); + assert_equals(event.data.errorName, "TypeError"); + assert_true(event.data.isTypeError, "exception should be TypeError"); +}; + +const throw_tests = [ + { + test_name: 'super() after new AudioWorkletProcessor()', + node_name: 'super-after-new', + thrower: 'super()' + }, + { + test_name: 'new AudioWorkletProcessor() after super()', + node_name: 'new-after-super', + thrower: 'new AudioWorkletProcessor()' + }, + { + test_name: 'new AudioWorkletProcessor() after new AudioWorkletProcessor()', + node_name: 'new-after-new', + thrower: 'new AudioWorkletProcessor()' + } +]; +for (const test_info of throw_tests) { + promise_test(async () => test_throws(test_info), test_info.test_name); +} + +promise_test(async (t) => { + const node_name = 'singleton'; + const context = await get_context_for_node_name(node_name); + const node1 = new AudioWorkletNode(context, node_name); + const node2 = new AudioWorkletNode(context, node_name); + node2.onmessage = t.unreached_func("node2 should not receive a message"); + let count = 0; + await new Promise((resolve) => { + node1.port.onmessage = t.step_func((event) => { + assert_less_than(count, 2, "message count"); + if (++count == 2) { resolve(); }; + }); + }); +}, 'Singleton AudioWorkletProcessor'); +</script> diff --git a/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-audioworklet-interface/processors/construction-port-new-after-new.js b/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-audioworklet-interface/processors/construction-port-new-after-new.js new file mode 100644 index 00000000000..d4c63f77755 --- /dev/null +++ b/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-audioworklet-interface/processors/construction-port-new-after-new.js @@ -0,0 +1,16 @@ +class NewAfterNew extends AudioWorkletProcessor { + constructor() { + const processor = new AudioWorkletProcessor() + let message = {threw: false}; + try { + new AudioWorkletProcessor(); + } catch (e) { + message.threw = true; + message.errorName = e.name; + message.isTypeError = e instanceof TypeError; + } + processor.port.postMessage(message); + return processor; + } +} +registerProcessor("new-after-new", NewAfterNew); diff --git a/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-audioworklet-interface/processors/construction-port-new-after-super.js b/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-audioworklet-interface/processors/construction-port-new-after-super.js new file mode 100644 index 00000000000..a6d4f0e2e8e --- /dev/null +++ b/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-audioworklet-interface/processors/construction-port-new-after-super.js @@ -0,0 +1,15 @@ +class NewAfterSuper extends AudioWorkletProcessor { + constructor() { + super() + let message = {threw: false}; + try { + new AudioWorkletProcessor() + } catch (e) { + message.threw = true; + message.errorName = e.name; + message.isTypeError = e instanceof TypeError; + } + this.port.postMessage(message); + } +} +registerProcessor("new-after-super", NewAfterSuper); diff --git a/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-audioworklet-interface/processors/construction-port-singleton.js b/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-audioworklet-interface/processors/construction-port-singleton.js new file mode 100644 index 00000000000..c40b5a7179a --- /dev/null +++ b/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-audioworklet-interface/processors/construction-port-singleton.js @@ -0,0 +1,16 @@ +let singleton; +class Singleton extends AudioWorkletProcessor { + constructor() { + if (!singleton) { + singleton = new AudioWorkletProcessor(); + singleton.process = function() { + this.port.postMessage({message: "process called"}); + // This function will be called at most once for each AudioWorkletNode + // if the node has no input connections. + return false; + } + } + return singleton; + } +} +registerProcessor("singleton", Singleton); diff --git a/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-audioworklet-interface/processors/construction-port-super-after-new.js b/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-audioworklet-interface/processors/construction-port-super-after-new.js new file mode 100644 index 00000000000..e447830c5ff --- /dev/null +++ b/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-audioworklet-interface/processors/construction-port-super-after-new.js @@ -0,0 +1,16 @@ +class SuperAfterNew extends AudioWorkletProcessor { + constructor() { + const processor = new AudioWorkletProcessor() + let message = {threw: false}; + try { + super(); + } catch (e) { + message.threw = true; + message.errorName = e.name; + message.isTypeError = e instanceof TypeError; + } + processor.port.postMessage(message); + return processor; + } +} +registerProcessor("super-after-new", SuperAfterNew); diff --git a/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-audioworklet-interface/processors/process-getter-test-instance-processor.js b/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-audioworklet-interface/processors/process-getter-test-instance-processor.js new file mode 100644 index 00000000000..b1434f54ba5 --- /dev/null +++ b/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-audioworklet-interface/processors/process-getter-test-instance-processor.js @@ -0,0 +1,44 @@ +/** + * @class ProcessGetterTestInstanceProcessor + * @extends AudioWorkletProcessor + * + * This processor class tests that a 'process' getter on an + * AudioWorkletProcessorConstructor instance is called at the right times. + */ + +class ProcessGetterTestInstanceProcessor extends AudioWorkletProcessor { + constructor() { + super(); + this.getterCallCount = 0; + this.totalProcessCallCount = 0; + Object.defineProperty(this, 'process', { get: function() { + if (!(this instanceof ProcessGetterTestInstanceProcessor)) { + throw new Error('`process` getter called with bad `this`.'); + } + ++this.getterCallCount; + let functionCallCount = 0; + return () => { + if (++functionCallCount > 1) { + const message = 'Closure of function returned from `process` getter' + + ' should be used for only one call.' + this.port.postMessage({message: message}); + throw new Error(message); + } + if (++this.totalProcessCallCount < 2) { + return true; // Expect another getter call. + } + if (this.totalProcessCallCount != this.getterCallCount) { + const message = + 'Getter should be called only once for each process() call.' + this.port.postMessage({message: message}); + throw new Error(message); + } + this.port.postMessage({message: 'done'}); + return false; // No more calls required. + }; + }}); + } +} + +registerProcessor('process-getter-test-instance', + ProcessGetterTestInstanceProcessor); diff --git a/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-audioworklet-interface/processors/process-getter-test-prototype-processor.js b/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-audioworklet-interface/processors/process-getter-test-prototype-processor.js new file mode 100644 index 00000000000..cef5fa8b52f --- /dev/null +++ b/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-audioworklet-interface/processors/process-getter-test-prototype-processor.js @@ -0,0 +1,55 @@ +/** + * @class ProcessGetterTestPrototypeProcessor + * @extends AudioWorkletProcessor + * + * This processor class tests that a 'process' getter on + * AudioWorkletProcessorConstructor is called at the right times. + */ + +// Reporting errors during registerProcess() is awkward. +// The occurrance of an error is flagged, so that a trial registration can be +// performed and registration against the expected AudioWorkletNode name is +// performed only if no errors are flagged during the trial registration. +let error_flag = false; + +class ProcessGetterTestPrototypeProcessor extends AudioWorkletProcessor { + constructor() { + super(); + this.getterCallCount = 0; + this.totalProcessCallCount = 0; + } + get process() { + if (!(this instanceof ProcessGetterTestPrototypeProcessor)) { + error_flag = true; + throw new Error('`process` getter called with bad `this`.'); + } + ++this.getterCallCount; + let functionCallCount = 0; + return () => { + if (++functionCallCount > 1) { + const message = 'Closure of function returned from `process` getter' + + ' should be used for only one call.' + this.port.postMessage({message: message}); + throw new Error(message); + } + if (++this.totalProcessCallCount < 2) { + return true; // Expect another getter call. + } + if (this.totalProcessCallCount != this.getterCallCount) { + const message = + 'Getter should be called only once for each process() call.' + this.port.postMessage({message: message}); + throw new Error(message); + } + this.port.postMessage({message: 'done'}); + return false; // No more calls required. + }; + } +} + +registerProcessor('trial-process-getter-test-prototype', + ProcessGetterTestPrototypeProcessor); +if (!error_flag) { + registerProcessor('process-getter-test-prototype', + ProcessGetterTestPrototypeProcessor); +} diff --git a/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-audioworklet-interface/processors/process-parameter-test-processor.js b/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-audioworklet-interface/processors/process-parameter-test-processor.js new file mode 100644 index 00000000000..a300d3cdec1 --- /dev/null +++ b/tests/wpt/web-platform-tests/webaudio/the-audio-api/the-audioworklet-interface/processors/process-parameter-test-processor.js @@ -0,0 +1,18 @@ +/** + * @class ProcessParameterTestProcessor + * @extends AudioWorkletProcessor + * + * This processor class forwards input and output parameters to its + * AudioWorkletNode. + */ +class ProcessParameterTestProcessor extends AudioWorkletProcessor { + process(inputs, outputs) { + this.port.postMessage({ + inputs: inputs, + outputs: outputs + }); + return false; + } +} + +registerProcessor('process-parameter-test', ProcessParameterTestProcessor); diff --git a/tests/wpt/web-platform-tests/webxr/hit-test/ar_hittest_subscription_refSpaces.https.html b/tests/wpt/web-platform-tests/webxr/hit-test/ar_hittest_subscription_refSpaces.https.html index 1f812d3a1f0..d1ce3154e6c 100644 --- a/tests/wpt/web-platform-tests/webxr/hit-test/ar_hittest_subscription_refSpaces.https.html +++ b/tests/wpt/web-platform-tests/webxr/hit-test/ar_hittest_subscription_refSpaces.https.html @@ -32,11 +32,10 @@ const fakeDeviceInitParams = { // Generates a test function given the parameters for the hit test. // |ray| - ray that will be used to subscribe to hit test. -// |entityTypes| - entity types that will be used for the hit test subscription. // |expectedPoses| - array of expected pose objects. The poses are expected to be expressed in local space. // Null entries in the array mean that the given entry will not be validated. // |refSpaceName| - XRReferenceSpaceType - either 'local', 'local-floor' or 'viewer'. -let testFunctionGenerator = function(ray, entityTypes, expectedPoses, refSpaceName) { +let testFunctionGenerator = function(ray, expectedPoses, refSpaceName) { const testFunction = function(session, fakeDeviceController, t) { return Promise.all([ session.requestReferenceSpace('local'), @@ -53,7 +52,6 @@ let testFunctionGenerator = function(ray, entityTypes, expectedPoses, refSpaceNa const hitTestOptionsInit = { space: refSpaceNameToSpace[refSpaceName], offsetRay: ray, - entityTypes: entityTypes, }; return session.requestHitTestSource(hitTestOptionsInit).then( @@ -90,20 +88,20 @@ let testFunctionGenerator = function(ray, entityTypes, expectedPoses, refSpaceNa // Generates a test function that will use local space for hit test subscription. // See testFunctionGenerator for explanation of other parameters. -const localBasedTestFunctionGenerator = function(ray, entityTypes, expectedPoses) { - return testFunctionGenerator(ray, entityTypes, expectedPoses, 'local'); +const localBasedTestFunctionGenerator = function(ray, expectedPoses) { + return testFunctionGenerator(ray, expectedPoses, 'local'); }; // Generates a test function that will use viewer space for hit test subscription. // See testFunctionGenerator for explanation of other parameters. -const viewerBasedTestFunctionGenerator = function(ray, entityTypes, expectedPoses) { - return testFunctionGenerator(ray, entityTypes, expectedPoses, 'viewer'); +const viewerBasedTestFunctionGenerator = function(ray, expectedPoses) { + return testFunctionGenerator(ray, expectedPoses, 'viewer'); }; // Generates a test function that will use local-floor space for hit test subscription. // See testFunctionGenerator for explanation of other parameters. -const localFloorBasedTestFunctionGenerator = function(ray, entityTypes, expectedPoses) { - return testFunctionGenerator(ray, entityTypes, expectedPoses, 'local-floor'); +const localFloorBasedTestFunctionGenerator = function(ray, expectedPoses) { + return testFunctionGenerator(ray, expectedPoses, 'local-floor'); }; // All test cases require local-floor and hit-test. @@ -124,27 +122,14 @@ const pose_1 = { xr_session_promise_test( "Ensures subscription to hit test works with viewer space - straight ahead - plane", - viewerBasedTestFunctionGenerator(new XRRay(), ["plane"], [pose_1]), + viewerBasedTestFunctionGenerator(new XRRay(), [pose_1]), fakeDeviceInitParams, 'immersive-ar', sessionInit); -xr_session_promise_test("Ensures subscription to hit test works with viewer space - straight up - plane - no results", - viewerBasedTestFunctionGenerator(new XRRay({}, {x: 0.0, y: 1.0, z : 0.0}), ["plane"], []), +xr_session_promise_test("Ensures subscription to hit test works with viewer space - straight up - no results", + viewerBasedTestFunctionGenerator(new XRRay({}, {x: 0.0, y: 1.0, z : 0.0}), []), fakeDeviceInitParams, 'immersive-ar', sessionInit); const pose_2 = { - position: {x: 0.0, y: 2.0, z: 0.0, w: 1.0}, - orientation: {x: 0.707, y: 0.0, z: 0.707, w: 0.0 }, - // See comment for pose_1.orientation for details. - // In this case, the hit test pose will have Y axis facing downward ([0,-1,0]), - // Z axis to the right ([1,0,0]) and X axis towards world's Z axis ([0,0,1]). - // This is equivalent to the rotation around [1, 0, 1] vectir by 180 degrees. -}; - -xr_session_promise_test("Ensures subscription to hit test works with viewer space - straight up - point", - viewerBasedTestFunctionGenerator(new XRRay({}, {x: 0.0, y: 1.0, z : 0.0}), ["point"], [pose_2]), - fakeDeviceInitParams, 'immersive-ar', sessionInit); - -const pose_3 = { position: {x: 0.0, y: 0.0, z: -2.5, w: 1.0}, orientation: {x: 0.0, y: -0.707, z: -0.707, w: 0.0}, // See comment for pose_1.orientation for details. @@ -154,10 +139,10 @@ const pose_3 = { }; xr_session_promise_test("Ensures subscription to hit test works with local space", - localBasedTestFunctionGenerator(new XRRay(), ["plane"], [pose_3]), + localBasedTestFunctionGenerator(new XRRay(), [pose_2]), fakeDeviceInitParams, 'immersive-ar', sessionInit); -const pose_4 = { +const pose_3 = { position: {x: 0.0, y: 0.25, z: -2.5, w: 1.0}, orientation: {x: 0.0, y: -0.707, z: -0.707, w: 0.0}, // See comment for pose_1.orientation for details. @@ -167,7 +152,7 @@ const pose_4 = { }; xr_session_promise_test("Ensures subscription to hit test works with local-floor space", - localFloorBasedTestFunctionGenerator(new XRRay(), ["plane"], [pose_4]), + localFloorBasedTestFunctionGenerator(new XRRay(), [pose_3]), fakeDeviceInitParams, 'immersive-ar', sessionInit); </script> diff --git a/tests/wpt/web-platform-tests/webxr/resources/webxr_test_constants_fake_world.js b/tests/wpt/web-platform-tests/webxr/resources/webxr_test_constants_fake_world.js index 0601f54fce9..4e2adc633fd 100644 --- a/tests/wpt/web-platform-tests/webxr/resources/webxr_test_constants_fake_world.js +++ b/tests/wpt/web-platform-tests/webxr/resources/webxr_test_constants_fake_world.js @@ -8,7 +8,11 @@ // width - X axis, in meters // height - Y axis, in meters // length - Z axis, in meters -function createFakeWorld(width, height, length) { +function createFakeWorld( + width, height, length, + front_wall_and_floor_type = "plane", + side_walls_type = "mesh", + ceiling_type = "point") { // Vertices: const BOTTOM_LEFT_FRONT = { x: -width/2, y: 0, z: -length/2, w: 1}; const BOTTOM_RIGHT_FRONT = { x: width/2, y: 0, z: -length/2, w: 1}; @@ -49,17 +53,17 @@ function createFakeWorld(width, height, length) { // Regions: const FRONT_WALL_AND_FLOOR_REGION = { - type: "plane", + type: front_wall_and_floor_type, faces: FRONT_WALL_AND_FLOOR_FACES, }; const SIDE_WALLS_REGION = { - type: "mesh", + type: side_walls_type, faces: SIDE_WALLS_FACES, }; const CEILING_REGION = { - type: "point", + type: ceiling_type, faces: CEILING_FACES, }; diff --git a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/1 b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/1 index c3f67beea90..831434e6399 100644 --- a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/1 +++ b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/1 @@ -1,3 +1,3 @@ -onconnect = function(e) { +onconnect = e => { e.ports[0].postMessage(['1', self.name]); -}
\ No newline at end of file +}; diff --git a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/URLMismatchError.htm b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/URLMismatchError.htm index e1a11f4f8fe..683d201ad3a 100644 --- a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/URLMismatchError.htm +++ b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/URLMismatchError.htm @@ -4,28 +4,27 @@ <link rel="author" title="Intel" href="http://www.intel.com"> <script src="/resources/testharness.js"></script> <script src="/resources/testharnessreport.js"></script> -<div id="log"></div> <script> setup({ single_test: true }); -var counter = 0 -function maybeDone() { +let counter = 0 +const maybeDone = () => { if(counter) { done() } counter++ } -var worker = new SharedWorker('shared-worker.js', 'name'); +const worker = new SharedWorker('shared-worker.js', 'name'); worker.port.postMessage("trigger a response") -worker.port.onmessage = (e) => { +worker.port.onmessage = e => { assert_equals(e.data, "ping") maybeDone() } // This used to throw "URLMismatchError", but the standard changed -var worker2 = new SharedWorker('1', 'name'); -worker2.port.onmessage = (e) => { +const worker2 = new SharedWorker('1', 'name'); +worker2.port.onmessage = e => { assert_array_equals(e.data, ["1", "name"]) maybeDone() } diff --git a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/connect-event.html b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/connect-event.html index a8dc7140671..0ab41d25c90 100644 --- a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/connect-event.html +++ b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/connect-event.html @@ -2,16 +2,13 @@ <title>connect event</title> <script src="/resources/testharness.js"></script> <script src="/resources/testharnessreport.js"></script> -<div id="log"></div> <script> -(async_test()).step(function() { - var worker = new SharedWorker('connect-event.js'); - worker.port.addEventListener('message', this.step_func(function(e) { +async_test(t => { + const worker = new SharedWorker('connect-event.js'); + worker.port.onmessage = t.step_func_done(e => { assert_true(e.data[0], "e.data === ''"); assert_true(e.data[1], "e instanceof MessageEvent"); assert_true(e.data[2], "e.ports.length == 1"); - this.done(); - }), false); - worker.port.start(); -}); -</script>
\ No newline at end of file + }); +}, 'Test connect event for a shared worker'); +</script> diff --git a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/connect-event.js b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/connect-event.js index c397152fe9e..2cf26a723e8 100644 --- a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/connect-event.js +++ b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/connect-event.js @@ -1,3 +1,3 @@ -onconnect = function(e) { +onconnect = e => { e.ports[0].postMessage([e.data === '', e instanceof MessageEvent, e.ports.length == 1]); -};
\ No newline at end of file +}; diff --git a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/dummy-name.html b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/dummy-name.html index 59097c722e6..25277042e21 100644 --- a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/dummy-name.html +++ b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/dummy-name.html @@ -3,9 +3,8 @@ <link rel=help href="http://www.whatwg.org/html/#dom-sharedworker"> <script src="/resources/testharness.js"></script> <script src="/resources/testharnessreport.js"></script> -<div id="log"></div> <script> -test(function() { - var worker = new SharedWorker('empty.js', 'foo'); +test(() => { + const worker = new SharedWorker('empty.js', 'foo'); }); </script> diff --git a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/dummy-shared-worker.html b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/dummy-shared-worker.html index 0c04f1f5fec..59a449ad7d8 100644 --- a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/dummy-shared-worker.html +++ b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/dummy-shared-worker.html @@ -3,9 +3,8 @@ <link rel=help href="http://www.whatwg.org/html/#dom-sharedworker"> <script src="/resources/testharness.js"></script> <script src="/resources/testharnessreport.js"></script> -<div id="log"></div> <script> -test(function() { - var worker = new SharedWorker('dummy-shared-worker.js'); +test(() => { + const worker = new SharedWorker('dummy-shared-worker.js'); }); -</script>
\ No newline at end of file +</script> diff --git a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/empty-name.html b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/empty-name.html index c37f6b629b0..94771d27c9e 100644 --- a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/empty-name.html +++ b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/empty-name.html @@ -3,9 +3,8 @@ <link rel=help href="http://www.whatwg.org/html/#dom-sharedworker"> <script src="/resources/testharness.js"></script> <script src="/resources/testharnessreport.js"></script> -<div id="log"></div> <script> -test(function() { - var worker = new SharedWorker('empty.js', ''); +test(() => { + const worker = new SharedWorker('empty.js', ''); }); </script> diff --git a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/global-members.html b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/global-members.html index 6860e68579b..2da4fc1cee6 100644 --- a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/global-members.html +++ b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/global-members.html @@ -2,14 +2,11 @@ <title>members of SharedWorkerGlobalScope</title> <script src="/resources/testharness.js"></script> <script src="/resources/testharnessreport.js"></script> -<div id="log"></div> <script> -(async_test()).step(function() { - var worker = new SharedWorker('global-members.js'); - worker.port.addEventListener('message', this.step_func(function(e) { +async_test(t => { + const worker = new SharedWorker('global-members.js'); + worker.port.onmessage = t.step_func_done(e => { assert_equals(e.data, ''); - this.done(); - }), false); - worker.port.start(); -}); -</script>
\ No newline at end of file + }); +}, 'Test if global members exist in a shared worker'); +</script> diff --git a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/global-members.js b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/global-members.js index 47834479316..453da6aae51 100644 --- a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/global-members.js +++ b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/global-members.js @@ -1,9 +1,9 @@ -var expected = 'self location close onerror importScripts navigator addEventListener removeEventListener dispatchEvent name onconnect setTimeout clearTimeout setInterval clearInterval'.split(' '); -var log = ''; -for (var i = 0; i < expected.length; ++i) { +const expected = 'self location close onerror importScripts navigator addEventListener removeEventListener dispatchEvent name onconnect setTimeout clearTimeout setInterval clearInterval'.split(' '); +let log = ''; +for (let i = 0; i < expected.length; ++i) { if (!(expected[i] in self)) log += expected[i] + ' did not exist\n'; } -onconnect = function(e) { +onconnect = e => { e.ports[0].postMessage(log); -};
\ No newline at end of file +}; diff --git a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/interface-objects.html b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/interface-objects.html index 01949ddbf75..6c2ef969a20 100644 --- a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/interface-objects.html +++ b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/interface-objects.html @@ -2,21 +2,19 @@ <title>expected interface objects/constructors</title> <script src="/resources/testharness.js"></script> <script src="/resources/testharnessreport.js"></script> -<div id="log"></div> <script> -(async_test()).step(function() { - var expected = 'XMLHttpRequest WebSocket EventSource MessageChannel Worker SharedWorker ApplicationCache'.split(' '); - var supported = []; - for (var i = 0; i < expected.length; ++i) { +async_test(t => { + const expected = 'XMLHttpRequest WebSocket EventSource MessageChannel Worker SharedWorker ApplicationCache'.split(' '); + const supported = []; + for (let i = 0; i < expected.length; ++i) { if (expected[i] in window) supported.push(expected[i]); } - var worker = new SharedWorker('interface-objects.js'); + const worker = new SharedWorker('interface-objects.js'); worker.port.start(); worker.port.postMessage(supported); - worker.port.addEventListener('message', this.step_func(function(e) { + worker.port.onmessage = t.step_func_done(e => { assert_equals(e.data, ''); - this.done(); - }), false); -}); -</script>
\ No newline at end of file + }); +}, 'Test if interface objects exist in a shared worker'); +</script> diff --git a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/interface-objects.js b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/interface-objects.js index 15de7c9a545..2a7aaee687a 100644 --- a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/interface-objects.js +++ b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/interface-objects.js @@ -1,13 +1,13 @@ -var prt; -function handleCall(e) { - var log = []; - for (var i = 0; i < e.data.length; ++i) { +let prt; +const handleCall = e => { + const log = []; + for (let i = 0; i < e.data.length; ++i) { if (!(e.data[i] in self)) log.push(e.data[i]); } prt.postMessage('These were missing: '+log.join(', ')); -} -onconnect = function(e) { +}; +onconnect = e => { prt = e.ports[0]; prt.onmessage = handleCall; -};
\ No newline at end of file +}; diff --git a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/name.html b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/name.html index 83b00725bcc..4531cb1b800 100644 --- a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/name.html +++ b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/name.html @@ -2,14 +2,11 @@ <title>self.name</title> <script src="/resources/testharness.js"></script> <script src="/resources/testharnessreport.js"></script> -<div id="log"></div> <script> -(async_test()).step(function() { - var worker = new SharedWorker('name.js', 'hello'); - worker.port.addEventListener('message', this.step_func(function(e) { +async_test(t => { + const worker = new SharedWorker('name.js', 'hello'); + worker.port.onmessage = t.step_func_done(e => { assert_equals(e.data, 'hello'); - this.done(); - }), false); - worker.port.start(); -}); + }); +}, 'Test self.name in a shared worker'); </script> diff --git a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/name.js b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/name.js index 88b26847602..2bc2a4b18b5 100644 --- a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/name.js +++ b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/name.js @@ -1,3 +1,3 @@ -onconnect = function(e) { +onconnect = e => { e.ports[0].postMessage(self.name); -} +}; diff --git a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/no-arguments-ctor.html b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/no-arguments-ctor.html index c189e556019..5a1231d7b59 100644 --- a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/no-arguments-ctor.html +++ b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/no-arguments-ctor.html @@ -1,20 +1,13 @@ -<!-- -/* ---> <!doctype html> <title>no arguments</title> <link rel=help href="http://www.whatwg.org/html/#sharedworker"> <link rel=help href="http://dev.w3.org/2006/webapi/WebIDL/#es-interface-call"> <script src="/resources/testharness.js"></script> <script src="/resources/testharnessreport.js"></script> -<div id="log"></div> <script> -test(function() { - assert_throws_js(TypeError, function() { - var worker = new SharedWorker(); +test(() => { + assert_throws_js(TypeError, () => { + const worker = new SharedWorker(); }); }); </script> -<!-- -*/ -//--> diff --git a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/null b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/null index 5c38505b6c8..16f02d51316 100644 --- a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/null +++ b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/null @@ -1,3 +1,3 @@ -onconnect = function(e) { +onconnect = e => { e.ports[0].postMessage(['null', self.name]); -}
\ No newline at end of file +}; diff --git a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/null-arguments.html b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/null-arguments.html index c516eed2154..dd5e5773edb 100644 --- a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/null-arguments.html +++ b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/null-arguments.html @@ -1,25 +1,13 @@ -<!-- -onconnect = function(e) { - e.ports[0].postMessage(['FAIL', self.name]); -} -/* ---> <!doctype html> <title>null as arguments</title> <script src="/resources/testharness.js"></script> <script src="/resources/testharnessreport.js"></script> -<div id="log"></div> <script> -(async_test()).step(function() { - var worker = new SharedWorker(null, null); - worker.port.addEventListener('message', this.step_func(function(e) { - assert_equals(e.data[0], 'null', 'first arg'); - assert_equals(e.data[1], '', 'second arg'); - this.done(); - }), false); - worker.port.start(); -}); +async_test(t => { + const worker = new SharedWorker(null, null); + worker.port.onmessage = t.step_func_done(e => { + assert_equals(e.data[0], 'null', 'first arg (script name)'); + assert_equals(e.data[1], '', 'second arg (worker name)'); + }); +}, 'Test constructing a shared worker with null'); </script> -<!-- -*/ -//--> diff --git a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/number-arguments.html b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/number-arguments.html index 1a4cfb2eacb..8f90baa8985 100644 --- a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/number-arguments.html +++ b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/number-arguments.html @@ -1,25 +1,13 @@ -<!-- -onconnect = function(e) { - e.ports[0].postMessage(['FAIL', self.name]); -} -/* ---> <!doctype html> <title>1 as arguments</title> <script src="/resources/testharness.js"></script> <script src="/resources/testharnessreport.js"></script> -<div id="log"></div> <script> -(async_test()).step(function() { - var worker = new SharedWorker(1, 1); - worker.port.addEventListener('message', this.step_func(function(e) { - assert_equals(e.data[0], '1', 'first arg'); - assert_equals(e.data[1], '1', 'second arg'); - this.done(); - }), false); - worker.port.start(); -}); +async_test(t => { + const worker = new SharedWorker(1, 1); + worker.port.onmessage = t.step_func_done(e => { + assert_equals(e.data[0], '1', 'first arg (script name)'); + assert_equals(e.data[1], '1', 'second arg (worker name)'); + }); +}, 'Test constructing a shared worker with 1'); </script> -<!-- -*/ -//-->
\ No newline at end of file diff --git a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/port-onmessage.html b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/port-onmessage.html index 12784e9ba40..706420c5e4a 100644 --- a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/port-onmessage.html +++ b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/port-onmessage.html @@ -2,13 +2,11 @@ <title>worker.port.onmessage</title> <script src="/resources/testharness.js"></script> <script src="/resources/testharnessreport.js"></script> -<div id="log"></div> <script> -(async_test()).step(function() { - var worker = new SharedWorker('port-onmessage.js', ''); - worker.port.onmessage = this.step_func(function(e) { +async_test(t => { + const worker = new SharedWorker('port-onmessage.js', ''); + worker.port.onmessage = t.step_func_done(e => { assert_true(e.data); - this.done(); }); -}); +}, 'Test SharedWorker.port.onmessage'); </script> diff --git a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/port-onmessage.js b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/port-onmessage.js index 83d4579287a..64ef84df15a 100644 --- a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/port-onmessage.js +++ b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/port-onmessage.js @@ -1,3 +1,3 @@ -onconnect = function(e) { +onconnect = e => { e.ports[0].postMessage(true); -} +}; diff --git a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/port-properties.html b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/port-properties.html index 8f6f58a2810..e2a1d5b2a8f 100644 --- a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/port-properties.html +++ b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/port-properties.html @@ -4,10 +4,9 @@ <link rel=help href="http://www.whatwg.org/html/#messageport"> <script src="/resources/testharness.js"></script> <script src="/resources/testharnessreport.js"></script> -<div id="log"></div> <script> -test(function() { - var worker = new SharedWorker('empty.js', ''); +test(() => { + const worker = new SharedWorker('empty.js', ''); assert_true('port' in worker, "port"); assert_true('postMessage' in worker.port, "postMessage"); assert_true('start' in worker.port, "start"); diff --git a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/port-readonly.html b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/port-readonly.html index 181b3116f99..cfb5f3afa51 100644 --- a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/port-readonly.html +++ b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/port-readonly.html @@ -4,11 +4,10 @@ <link rel=help href="http://dev.w3.org/2006/webapi/WebIDL/#dfn-attribute-setter"> <script src="/resources/testharness.js"></script> <script src="/resources/testharnessreport.js"></script> -<div id="log"></div> <script> -test(function() { - var worker = new SharedWorker('empty.js', ''); - var x = worker.port; +test(() => { + const worker = new SharedWorker('empty.js', ''); + const x = worker.port; worker.port = 1; assert_equals(worker.port, x); }); diff --git a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/same-origin.html b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/same-origin.html index 1fc76d5f5e4..0bfc503d06f 100644 --- a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/same-origin.html +++ b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/same-origin.html @@ -1,22 +1,18 @@ -<!-- -/* ---> <!doctype html> <title>same-origin checks</title> <meta name="timeout" content="long"> <link rel=help href="https://html.spec.whatwg.org/multipage/workers.html#dom-sharedworker"> <script src="/resources/testharness.js"></script> <script src="/resources/testharnessreport.js"></script> -<div id="log"></div> <script> // Needed to prevent a race condition if a worker throws an exception that may or may // not propogate to the window before the tests finish setup({allow_uncaught_exception: true}); -function testSharedWorkerHelper(t, script) { +testSharedWorkerHelper = (t, script) => { try { - var worker = new SharedWorker(script, ''); - worker.onerror = t.step_func_done(function(e) { + const worker = new SharedWorker(script, ''); + worker.onerror = t.step_func_done(e => { assert_true(e instanceof Event); }); } catch (e) { @@ -25,45 +21,42 @@ function testSharedWorkerHelper(t, script) { } } -test(function() { - assert_throws_dom("SecurityError", function() { new SharedWorker('unsupported:', ''); }); +test(() => { + assert_throws_dom("SecurityError", () => { new SharedWorker('unsupported:', ''); }); }, "unsupported_scheme"); -async_test(function() { - var worker = new SharedWorker('data:,onconnect = function(e) { e.ports[0].postMessage(1); }', ''); - worker.port.onmessage = this.step_func_done(function(e) { +async_test(t => { + const worker = new SharedWorker('data:,onconnect = e => { e.ports[0].postMessage(1); }', ''); + worker.port.onmessage = t.step_func_done(e => { assert_equals(e.data, 1); }); }, "data_url"); -async_test(function(t) { - testSharedWorkerHelper(this, 'javascript:""'); +async_test(t => { + testSharedWorkerHelper(t, 'javascript:""'); }, "javascript_url"); -async_test(function(t) { - testSharedWorkerHelper(this, 'about:blank'); +async_test(t => { + testSharedWorkerHelper(t, 'about:blank'); }, "about_blank"); -async_test(function(t) { - testSharedWorkerHelper(this, 'http://www.opera.com/'); +async_test(t => { + testSharedWorkerHelper(t, 'http://www.opera.com/'); }, "opera_com"); -async_test(function(t) { - testSharedWorkerHelper(this, location.protocol+'//'+location.hostname+':81/'); +async_test(t => { + testSharedWorkerHelper(t, location.protocol+'//'+location.hostname+':81/'); }, "port_81"); -async_test(function(t) { - testSharedWorkerHelper(this, 'https://'+location.hostname+':80/'); +async_test(t => { + testSharedWorkerHelper(t, 'https://'+location.hostname+':80/'); }, "https_port_80"); -async_test(function(t) { - testSharedWorkerHelper(this, 'https://'+location.hostname+':8000/'); +async_test(t => { + testSharedWorkerHelper(t, 'https://'+location.hostname+':8000/'); }, "https_port_8000"); -async_test(function(t) { - testSharedWorkerHelper(this, 'http://'+location.hostname+':8012/'); +async_test(t => { + testSharedWorkerHelper(t, 'http://'+location.hostname+':8012/'); }, "http_port_8012"); </script> -<!-- -*/ -//--> diff --git a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/setting-port-members.html b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/setting-port-members.html index 8c79ff295e5..367b756d33b 100644 --- a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/setting-port-members.html +++ b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/setting-port-members.html @@ -1,39 +1,35 @@ -<!-- -/* ---> <!doctype html> <title>setting members of worker.port</title> <script src="/resources/testharness.js"></script> <script src="/resources/testharnessreport.js"></script> -<div id="log"></div> <script> -setup(function() { +setup(() => { window.worker = new SharedWorker('#', ''); }); -test(function() { +test(() => { worker.port.postMessage = 1; assert_equals(worker.port.postMessage, 1); }, 'postMessage'); -test(function() { +test(() => { worker.port.start = 1; assert_equals(worker.port.start, 1); }, 'start'); -test(function() { +test(() => { worker.port.close = 1; assert_equals(worker.port.close, 1); }, 'close'); -test(function() { - var f = function(){}; +test(() => { + const f = () => {}; worker.port.onmessage = f; - assert_equals(worker.port.onmessage, f, 'function(){}'); + assert_equals(worker.port.onmessage, f, '() => {}'); worker.port.onmessage = 1; assert_equals(worker.port.onmessage, null, '1'); worker.port.onmessage = f; worker.port.onmessage = ';'; assert_equals(worker.port.onmessage, null, '";"'); worker.port.onmessage = f; - worker.port.onmessage = {handleEvent:function(){}}; - assert_equals(worker.port.onmessage, null, '{handleEvent:function(){}}'); + worker.port.onmessage = {handleEvent:() => {}}; + assert_equals(worker.port.onmessage, null, '{handleEvent:() => {}}'); worker.port.onmessage = f; worker.port.onmessage = null; assert_equals(worker.port.onmessage, null, 'null'); @@ -41,19 +37,16 @@ test(function() { worker.port.onmessage = undefined; assert_equals(worker.port.onmessage, null, 'undefined'); }, 'onmessage'); -test(function() { +test(() => { worker.port.addEventListener = 1; assert_equals(worker.port.addEventListener, 1); }, 'addEventListener'); -test(function() { +test(() => { worker.port.removeEventListener = 1; assert_equals(worker.port.removeEventListener, 1); }, 'removeEventListener'); -test(function() { +test(() => { worker.port.despatchEvent = 1; assert_equals(worker.port.despatchEvent, 1); }, 'despatchEvent'); </script> -<!-- -*/ -//--> diff --git a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/shared-worker.js b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/shared-worker.js index babebb1ce8e..b6d18855da5 100644 --- a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/shared-worker.js +++ b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/shared-worker.js @@ -1,6 +1,6 @@ -onconnect = function(e) { - var port = e.ports[0]; - port.onmessage = function(e) { +onconnect = e => { + const port = e.ports[0]; + port.onmessage = e => { port.postMessage('ping'); } } diff --git a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/undefined b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/undefined index 3fe840d3042..b8462f19118 100644 --- a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/undefined +++ b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/undefined @@ -1,3 +1,3 @@ -onconnect = function(e) { +onconnect = e => { e.ports[0].postMessage(['undefined', self.name]); -}
\ No newline at end of file +}; diff --git a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/undefined-arguments.html b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/undefined-arguments.html index bc0a75bcfeb..cd4c86e84ab 100644 --- a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/undefined-arguments.html +++ b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/undefined-arguments.html @@ -1,25 +1,13 @@ -<!-- -onconnect = function(e) { - e.ports[0].postMessage(['FAIL', self.name]); -} -/* ---> <!doctype html> <title>undefined as arguments</title> <script src="/resources/testharness.js"></script> <script src="/resources/testharnessreport.js"></script> -<div id="log"></div> <script> -(async_test()).step(function() { - var worker = new SharedWorker(undefined, undefined); - worker.port.addEventListener('message', this.step_func(function(e) { - assert_equals(e.data[0], 'undefined', 'first arg'); - assert_equals(e.data[1], '', 'second arg'); - this.done(); - }), false); - worker.port.start(); -}); +async_test(t => { + const worker = new SharedWorker(undefined, undefined); + worker.port.onmessage = t.step_func_done(e => { + assert_equals(e.data[0], 'undefined', 'first arg (script name)'); + assert_equals(e.data[1], '', 'second arg (worker name)'); + }); +}, 'Test constructing a shared worker with undefined'); </script> -<!-- -*/ -//--> diff --git a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/unexpected-global-properties.html b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/unexpected-global-properties.html index 77a4f630416..522d31ff56b 100644 --- a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/unexpected-global-properties.html +++ b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/unexpected-global-properties.html @@ -2,14 +2,11 @@ <title>unexpected members/interface objects/constructors</title> <script src="/resources/testharness.js"></script> <script src="/resources/testharnessreport.js"></script> -<div id="log"></div> <script> -(async_test()).step(function() { - var worker = new SharedWorker('unexpected-global-properties.js'); - worker.port.addEventListener('message', this.step_func(function(e) { +async_test(t => { + const worker = new SharedWorker('unexpected-global-properties.js'); + worker.port.onmessage = t.step_func_done(e => { assert_equals(e.data, ''); - this.done(); - }), false); - worker.port.start(); -}); -</script>
\ No newline at end of file + }); +}, 'Test unexpected properties are not in global scope'); +</script> diff --git a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/unexpected-global-properties.js b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/unexpected-global-properties.js index d2cd94b4d90..0af89358214 100644 --- a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/unexpected-global-properties.js +++ b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/unexpected-global-properties.js @@ -1,9 +1,9 @@ -var unexpected = 'open print stop getComputedStyle getSelection releaseEvents captureEvents alert confirm prompt addEventStream removeEventStream back forward attachEvent detachEvent navigate DOMParser XMLSerializer XPathEvaluator XSLTProcessor opera Image Option frames Audio SVGUnitTypes SVGZoomAndPan java netscape sun Packages ByteArray closed defaultStatus document event frameElement history innerHeight innerWidth opener outerHeight outerWidth pageXOffset pageYOffset parent screen screenLeft screenTop screenX screenY status top window length'.split(' '); // iterated window in opera and removed expected ones -var log = ''; -for (var i = 0; i < unexpected.length; ++i) { +const unexpected = 'open print stop getComputedStyle getSelection releaseEvents captureEvents alert confirm prompt addEventStream removeEventStream back forward attachEvent detachEvent navigate DOMParser XMLSerializer XPathEvaluator XSLTProcessor opera Image Option frames Audio SVGUnitTypes SVGZoomAndPan java netscape sun Packages ByteArray closed defaultStatus document event frameElement history innerHeight innerWidth opener outerHeight outerWidth pageXOffset pageYOffset parent screen screenLeft screenTop screenX screenY status top window length'.split(' '); // iterated window in opera and removed expected ones +let log = ''; +for (let i = 0; i < unexpected.length; ++i) { if (unexpected[i] in self) log += unexpected[i] + ' '; } -onconnect = function(e) { +onconnect = e => { e.ports[0].postMessage(log); -};
\ No newline at end of file +}; diff --git a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/unresolvable-url.html b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/unresolvable-url.html index c392d0e1f7d..c68968d77dd 100644 --- a/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/unresolvable-url.html +++ b/tests/wpt/web-platform-tests/workers/constructors/SharedWorker/unresolvable-url.html @@ -1,19 +1,12 @@ -<!-- -/* ---> <!doctype html> <title>resolving broken url</title> <link rel=help href="http://www.whatwg.org/html/#dom-sharedworker"> <script src="/resources/testharness.js"></script> <script src="/resources/testharnessreport.js"></script> -<div id="log"></div> <script> -test(function() { - assert_throws_dom("SyntaxError", function() { - var worker = new SharedWorker('http://foo bar'); +test(() => { + assert_throws_dom("SyntaxError", () => { + const worker = new SharedWorker('http://foo bar'); }); }); </script> -<!-- -*/ -//--> |