Bug 1578889 [wpt PR 18852] - [WPT/referrer-policy] Regenerate script-tag tests, a=testonly

Automatic update from web-platform-tests
[WPT/referrer-policy] Regenerate script-tag tests

This CL regenerates script-tag test files
that reflects changes [1] and previous changes in
https://crbug.com/906850 and removes old files.

Purely mechanical.
This CL largely renames test file names, and [2] contains
old->new file name mapping data.

[1] https://chromium-review.googlesource.com/c/chromium/src/+/1586548
[2] https://chromium-review.googlesource.com/c/chromium/src/+/1783799

Bug: 906850
Change-Id: I1edff40dcc64019174266cd497ce9c611f9a9e7f
Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/1785457
Reviewed-by: Kenichi Ishibashi <bashi@chromium.org>
Commit-Queue: Hiroshige Hayashizaki <hiroshige@chromium.org>
Cr-Commit-Position: refs/heads/master@{#693499}

--

wpt-commits: e81ffbdbd26e01843de83b87ffdb589d21a105fb
wpt-pr: 18852
This commit is contained in:
Hiroshige Hayashizaki 2019-09-05 14:52:40 +00:00 коммит произвёл James Graham
Родитель ace63baa03
Коммит 7c9c99875b
528 изменённых файлов: 6214 добавлений и 7156 удалений

Просмотреть файл

@ -0,0 +1,34 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
<meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and keep-origin redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "stripped-referrer",
"origin": "cross-http",
"redirection": "keep-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

Просмотреть файл

@ -1,34 +1,29 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
<!-- No meta: Referrer policy delivered via HTTP headers. -->
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
<meta name="assert" content="The referrer URL is stripped-referrer when a
document served over http requires an http
sub-resource via script-tag using the http-rp
delivery method with no-redirect and when
the target request is same-origin.">
<meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and no-redirect redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
ReferrerPolicyTestCase(
TestCase(
{
"referrer_policy": "no-referrer-when-downgrade",
"delivery_method": "http-rp",
"expectation": "stripped-referrer",
"origin": "cross-http",
"redirection": "no-redirect",
"origin": "same-origin",
"source_protocol": "http",
"target_protocol": "http",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"referrer_url": "stripped-referrer"
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()

Просмотреть файл

@ -0,0 +1,34 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
<meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-http origin and swap-origin redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "stripped-referrer",
"origin": "cross-http",
"redirection": "swap-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

Просмотреть файл

@ -0,0 +1,34 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
<meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and keep-origin redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "stripped-referrer",
"origin": "cross-https",
"redirection": "keep-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

Просмотреть файл

@ -1,34 +1,29 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
<!-- No meta: Referrer policy delivered via HTTP headers. -->
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
<meta name="assert" content="The referrer URL is stripped-referrer when a
document served over http requires an https
sub-resource via script-tag using the http-rp
delivery method with no-redirect and when
the target request is same-origin.">
<meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and no-redirect redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
ReferrerPolicyTestCase(
TestCase(
{
"referrer_policy": "no-referrer-when-downgrade",
"delivery_method": "http-rp",
"expectation": "stripped-referrer",
"origin": "cross-https",
"redirection": "no-redirect",
"origin": "same-origin",
"source_protocol": "http",
"target_protocol": "https",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"referrer_url": "stripped-referrer"
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()

Просмотреть файл

@ -0,0 +1,2 @@
Access-Control-Allow-Origin: *
Referrer-Policy: no-referrer-when-downgrade

Просмотреть файл

@ -0,0 +1,34 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
<meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to cross-https origin and swap-origin redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "stripped-referrer",
"origin": "cross-https",
"redirection": "swap-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

Просмотреть файл

@ -0,0 +1,2 @@
Access-Control-Allow-Origin: *
Referrer-Policy: no-referrer-when-downgrade

Просмотреть файл

@ -0,0 +1,34 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
<meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "stripped-referrer",
"origin": "same-http",
"redirection": "keep-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

Просмотреть файл

@ -0,0 +1,2 @@
Access-Control-Allow-Origin: *
Referrer-Policy: no-referrer-when-downgrade

Просмотреть файл

@ -1,34 +1,29 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
<!-- No meta: Referrer policy delivered via HTTP headers. -->
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
<meta name="assert" content="The referrer URL is stripped-referrer when a
document served over http requires an http
sub-resource via script-tag using the http-rp
delivery method with no-redirect and when
the target request is cross-origin.">
<meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
ReferrerPolicyTestCase(
TestCase(
{
"referrer_policy": "no-referrer-when-downgrade",
"delivery_method": "http-rp",
"expectation": "stripped-referrer",
"origin": "same-http",
"redirection": "no-redirect",
"origin": "cross-origin",
"source_protocol": "http",
"target_protocol": "http",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"referrer_url": "stripped-referrer"
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()

Просмотреть файл

@ -0,0 +1,2 @@
Access-Control-Allow-Origin: *
Referrer-Policy: no-referrer-when-downgrade

Просмотреть файл

@ -0,0 +1,34 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
<meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and swap-origin redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "stripped-referrer",
"origin": "same-http",
"redirection": "swap-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

Просмотреть файл

@ -0,0 +1,2 @@
Access-Control-Allow-Origin: *
Referrer-Policy: no-referrer-when-downgrade

Просмотреть файл

@ -0,0 +1,34 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
<meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and keep-origin redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "stripped-referrer",
"origin": "same-https",
"redirection": "keep-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

Просмотреть файл

@ -0,0 +1,2 @@
Access-Control-Allow-Origin: *
Referrer-Policy: no-referrer-when-downgrade

Просмотреть файл

@ -1,34 +1,29 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
<!-- No meta: Referrer policy delivered via HTTP headers. -->
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
<meta name="assert" content="The referrer URL is stripped-referrer when a
document served over http requires an https
sub-resource via script-tag using the http-rp
delivery method with no-redirect and when
the target request is cross-origin.">
<meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and no-redirect redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
ReferrerPolicyTestCase(
TestCase(
{
"referrer_policy": "no-referrer-when-downgrade",
"delivery_method": "http-rp",
"expectation": "stripped-referrer",
"origin": "same-https",
"redirection": "no-redirect",
"origin": "cross-origin",
"source_protocol": "http",
"target_protocol": "https",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"referrer_url": "stripped-referrer"
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()

Просмотреть файл

@ -0,0 +1,2 @@
Access-Control-Allow-Origin: *
Referrer-Policy: no-referrer-when-downgrade

Просмотреть файл

@ -0,0 +1,34 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer-when-downgrade'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that non a priori insecure subresource gets the full Referrer URL. A priori insecure subresource gets no referrer information.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer-when-downgrade">
<meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-https origin and swap-origin redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "stripped-referrer",
"origin": "same-https",
"redirection": "swap-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

Просмотреть файл

@ -0,0 +1,2 @@
Access-Control-Allow-Origin: *
Referrer-Policy: no-referrer-when-downgrade

Просмотреть файл

@ -0,0 +1,34 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
<meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-http origin and keep-origin redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "omitted",
"origin": "cross-http",
"redirection": "keep-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

Просмотреть файл

@ -0,0 +1,34 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
<meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-http origin and no-redirect redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "omitted",
"origin": "cross-http",
"redirection": "no-redirect",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

Просмотреть файл

@ -0,0 +1,34 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
<meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-http origin and swap-origin redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "omitted",
"origin": "cross-http",
"redirection": "swap-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

Просмотреть файл

@ -0,0 +1,34 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
<meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-https origin and keep-origin redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "omitted",
"origin": "cross-https",
"redirection": "keep-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

Просмотреть файл

@ -0,0 +1,34 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
<meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-https origin and no-redirect redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "omitted",
"origin": "cross-https",
"redirection": "no-redirect",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

Просмотреть файл

@ -0,0 +1,2 @@
Access-Control-Allow-Origin: *
Referrer-Policy: no-referrer

Просмотреть файл

@ -0,0 +1,34 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
<meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-https origin and swap-origin redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "omitted",
"origin": "cross-https",
"redirection": "swap-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

Просмотреть файл

@ -0,0 +1,2 @@
Access-Control-Allow-Origin: *
Referrer-Policy: no-referrer

Просмотреть файл

@ -0,0 +1,34 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
<meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-http origin and keep-origin redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "omitted",
"origin": "same-http",
"redirection": "keep-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

Просмотреть файл

@ -0,0 +1,2 @@
Access-Control-Allow-Origin: *
Referrer-Policy: no-referrer

Просмотреть файл

@ -0,0 +1,34 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
<meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-http origin and no-redirect redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "omitted",
"origin": "same-http",
"redirection": "no-redirect",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

Просмотреть файл

@ -0,0 +1,2 @@
Access-Control-Allow-Origin: *
Referrer-Policy: no-referrer

Просмотреть файл

@ -0,0 +1,34 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
<meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-http origin and swap-origin redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "omitted",
"origin": "same-http",
"redirection": "swap-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

Просмотреть файл

@ -0,0 +1,2 @@
Access-Control-Allow-Origin: *
Referrer-Policy: no-referrer

Просмотреть файл

@ -0,0 +1,34 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
<meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-https origin and keep-origin redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "omitted",
"origin": "same-https",
"redirection": "keep-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

Просмотреть файл

@ -0,0 +1,2 @@
Access-Control-Allow-Origin: *
Referrer-Policy: no-referrer

Просмотреть файл

@ -0,0 +1,34 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
<meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-https origin and no-redirect redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "omitted",
"origin": "same-https",
"redirection": "no-redirect",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

Просмотреть файл

@ -0,0 +1,2 @@
Access-Control-Allow-Origin: *
Referrer-Policy: no-referrer

Просмотреть файл

@ -0,0 +1,34 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'no-referrer'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that sub-resource never gets the referrer URL.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-no-referrer">
<meta name="assert" content="Referrer Policy: Expects omitted for script-tag to same-https origin and swap-origin redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "omitted",
"origin": "same-https",
"redirection": "swap-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

Просмотреть файл

@ -0,0 +1,2 @@
Access-Control-Allow-Origin: *
Referrer-Policy: no-referrer

Просмотреть файл

@ -0,0 +1,34 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
<meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and keep-origin redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "origin",
"origin": "cross-http",
"redirection": "keep-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

Просмотреть файл

@ -1,34 +1,29 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
<!-- No meta: Referrer policy delivered via HTTP headers. -->
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
<meta name="assert" content="The referrer URL is origin when a
document served over http requires an http
sub-resource via script-tag using the http-rp
delivery method with no-redirect and when
the target request is cross-origin.">
<meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and no-redirect redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
ReferrerPolicyTestCase(
TestCase(
{
"referrer_policy": "origin-when-cross-origin",
"delivery_method": "http-rp",
"expectation": "origin",
"origin": "cross-http",
"redirection": "no-redirect",
"origin": "cross-origin",
"source_protocol": "http",
"target_protocol": "http",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"referrer_url": "origin"
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()

Просмотреть файл

@ -0,0 +1,34 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
<meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and swap-origin redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "origin",
"origin": "cross-http",
"redirection": "swap-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

Просмотреть файл

@ -0,0 +1,34 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
<meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and keep-origin redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "origin",
"origin": "cross-https",
"redirection": "keep-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

Просмотреть файл

@ -1,34 +1,29 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
<!-- No meta: Referrer policy delivered via HTTP headers. -->
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
<meta name="assert" content="The referrer URL is origin when a
document served over http requires an https
sub-resource via script-tag using the http-rp
delivery method with no-redirect and when
the target request is same-origin.">
<meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and no-redirect redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
ReferrerPolicyTestCase(
TestCase(
{
"referrer_policy": "origin-when-cross-origin",
"delivery_method": "http-rp",
"expectation": "origin",
"origin": "cross-https",
"redirection": "no-redirect",
"origin": "same-origin",
"source_protocol": "http",
"target_protocol": "https",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"referrer_url": "origin"
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()

Просмотреть файл

@ -0,0 +1,2 @@
Access-Control-Allow-Origin: *
Referrer-Policy: origin-when-cross-origin

Просмотреть файл

@ -0,0 +1,34 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
<meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and swap-origin redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "origin",
"origin": "cross-https",
"redirection": "swap-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

Просмотреть файл

@ -0,0 +1,2 @@
Access-Control-Allow-Origin: *
Referrer-Policy: origin-when-cross-origin

Просмотреть файл

@ -0,0 +1,34 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
<meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and keep-origin redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "stripped-referrer",
"origin": "same-http",
"redirection": "keep-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

Просмотреть файл

@ -0,0 +1,2 @@
Access-Control-Allow-Origin: *
Referrer-Policy: origin-when-cross-origin

Просмотреть файл

@ -1,34 +1,29 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
<!-- No meta: Referrer policy delivered via HTTP headers. -->
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
<meta name="assert" content="The referrer URL is origin when a
document served over http requires an https
sub-resource via script-tag using the http-rp
delivery method with no-redirect and when
the target request is cross-origin.">
<meta name="assert" content="Referrer Policy: Expects stripped-referrer for script-tag to same-http origin and no-redirect redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
ReferrerPolicyTestCase(
TestCase(
{
"referrer_policy": "origin-when-cross-origin",
"delivery_method": "http-rp",
"expectation": "stripped-referrer",
"origin": "same-http",
"redirection": "no-redirect",
"origin": "cross-origin",
"source_protocol": "http",
"target_protocol": "https",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"referrer_url": "origin"
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()

Просмотреть файл

@ -0,0 +1,2 @@
Access-Control-Allow-Origin: *
Referrer-Policy: origin-when-cross-origin

Просмотреть файл

@ -0,0 +1,34 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
<meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and swap-origin redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "origin",
"origin": "same-http",
"redirection": "swap-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

Просмотреть файл

@ -0,0 +1,2 @@
Access-Control-Allow-Origin: *
Referrer-Policy: origin-when-cross-origin

Просмотреть файл

@ -0,0 +1,34 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
<meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and keep-origin redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "origin",
"origin": "same-https",
"redirection": "keep-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

Просмотреть файл

@ -0,0 +1,2 @@
Access-Control-Allow-Origin: *
Referrer-Policy: origin-when-cross-origin

Просмотреть файл

@ -0,0 +1,34 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
<meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and no-redirect redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "origin",
"origin": "same-https",
"redirection": "no-redirect",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

Просмотреть файл

@ -0,0 +1,2 @@
Access-Control-Allow-Origin: *
Referrer-Policy: origin-when-cross-origin

Просмотреть файл

@ -0,0 +1,34 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'origin-when-cross-origin'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that cross-origin subresources get the origin portion of the referrer URL and same-origin get the stripped referrer URL.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin-when-cross-origin">
<meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and swap-origin redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "origin",
"origin": "same-https",
"redirection": "swap-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

Просмотреть файл

@ -0,0 +1,2 @@
Access-Control-Allow-Origin: *
Referrer-Policy: origin-when-cross-origin

Просмотреть файл

@ -0,0 +1,34 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
<meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and keep-origin redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "origin",
"origin": "cross-http",
"redirection": "keep-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

Просмотреть файл

@ -0,0 +1,34 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
<meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and no-redirect redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "origin",
"origin": "cross-http",
"redirection": "no-redirect",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

Просмотреть файл

@ -0,0 +1,34 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
<meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-http origin and swap-origin redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "origin",
"origin": "cross-http",
"redirection": "swap-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

Просмотреть файл

@ -0,0 +1,34 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
<meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and keep-origin redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "origin",
"origin": "cross-https",
"redirection": "keep-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

Просмотреть файл

@ -0,0 +1,34 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
<meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and no-redirect redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "origin",
"origin": "cross-https",
"redirection": "no-redirect",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

Просмотреть файл

@ -0,0 +1,2 @@
Access-Control-Allow-Origin: *
Referrer-Policy: origin

Просмотреть файл

@ -0,0 +1,34 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
<meta name="assert" content="Referrer Policy: Expects origin for script-tag to cross-https origin and swap-origin redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "origin",
"origin": "cross-https",
"redirection": "swap-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

Просмотреть файл

@ -0,0 +1,2 @@
Access-Control-Allow-Origin: *
Referrer-Policy: origin

Просмотреть файл

@ -0,0 +1,34 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
<meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and keep-origin redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "origin",
"origin": "same-http",
"redirection": "keep-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

Просмотреть файл

@ -0,0 +1,2 @@
Access-Control-Allow-Origin: *
Referrer-Policy: origin

Просмотреть файл

@ -0,0 +1,34 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
<meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and no-redirect redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "origin",
"origin": "same-http",
"redirection": "no-redirect",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

Просмотреть файл

@ -0,0 +1,2 @@
Access-Control-Allow-Origin: *
Referrer-Policy: origin

Просмотреть файл

@ -0,0 +1,34 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
<meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-http origin and swap-origin redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "origin",
"origin": "same-http",
"redirection": "swap-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

Просмотреть файл

@ -0,0 +1,2 @@
Access-Control-Allow-Origin: *
Referrer-Policy: origin

Просмотреть файл

@ -0,0 +1,34 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
<meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and keep-origin redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "origin",
"origin": "same-https",
"redirection": "keep-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

Просмотреть файл

@ -0,0 +1,2 @@
Access-Control-Allow-Origin: *
Referrer-Policy: origin

Просмотреть файл

@ -0,0 +1,34 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
<meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and no-redirect redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "origin",
"origin": "same-https",
"redirection": "no-redirect",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

Просмотреть файл

@ -0,0 +1,2 @@
Access-Control-Allow-Origin: *
Referrer-Policy: origin

Просмотреть файл

@ -0,0 +1,34 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'origin'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that all subresources in all casses get only the origin portion of the referrer URL.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-origin">
<meta name="assert" content="Referrer Policy: Expects origin for script-tag to same-https origin and swap-origin redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "origin",
"origin": "same-https",
"redirection": "swap-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

Просмотреть файл

@ -0,0 +1,2 @@
Access-Control-Allow-Origin: *
Referrer-Policy: origin

Просмотреть файл

@ -0,0 +1,34 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
<meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-http origin and keep-origin redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
TestCase(
{
"expectation": "omitted",
"origin": "cross-http",
"redirection": "keep-origin",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()
).start();
</script>
<div id="log"></div>
</body>
</html>

Просмотреть файл

@ -1,34 +1,29 @@
<!DOCTYPE html>
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
<html>
<head>
<title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
<meta charset='utf-8'>
<meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
<!-- No meta: Referrer policy delivered via HTTP headers. -->
<link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
<link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
<meta name="assert" content="The referrer URL is omitted when a
document served over http requires an http
sub-resource via script-tag using the http-rp
delivery method with no-redirect and when
the target request is cross-origin.">
<meta name="assert" content="Referrer Policy: Expects omitted for script-tag to cross-http origin and no-redirect redirection from http context.">
<script src="/resources/testharness.js"></script>
<script src="/resources/testharnessreport.js"></script>
<script src="/common/security-features/resources/common.js"></script>
<script src="/referrer-policy/generic/referrer-policy-test-case.sub.js"></script>
<script src="/referrer-policy/generic/test-case.sub.js"></script>
</head>
<body>
<script>
ReferrerPolicyTestCase(
TestCase(
{
"referrer_policy": "same-origin",
"delivery_method": "http-rp",
"expectation": "omitted",
"origin": "cross-http",
"redirection": "no-redirect",
"origin": "cross-origin",
"source_protocol": "http",
"target_protocol": "http",
"source_context_list": [],
"source_scheme": "http",
"subresource": "script-tag",
"referrer_url": "omitted"
"subresource_policy_deliveries": []
},
document.querySelector("meta[name=assert]").content,
new SanityChecker()

Некоторые файлы не были показаны из-за слишком большого количества измененных файлов Показать больше