зеркало из https://github.com/mozilla/gecko-dev.git
Bug 1418243 - Enable web-platform tests which expected FAIL because of violatedDirective. r=ckerschb
MozReview-Commit-ID: LkCwVWs2rSr --HG-- extra : rebase_source : 424721ff263563fd545615f2ba3addc8bcf2e492
This commit is contained in:
Родитель
d1124b72c7
Коммит
bc05f945c6
|
@ -1,5 +1,3 @@
|
|||
[report-uri-does-not-respect-base-uri.sub.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
[Event is fired]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,4 +1,3 @@
|
|||
[blob-urls-do-not-match-self.sub.html]
|
||||
[Expecting logs: ["violated-directive=script-src"\]]
|
||||
expected: FAIL
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
|
@ -1,10 +1,9 @@
|
|||
[connect-src-beacon-blocked.sub.html]
|
||||
type: testharness
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
[sendBeacon should not throw.]
|
||||
expected: FAIL
|
||||
|
||||
[redirect case]
|
||||
expected: TIMEOUT
|
||||
|
||||
[Expecting logs: ["Pass", "violated-directive=connect-src"\]]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,4 +1,3 @@
|
|||
[connect-src-beacon-redirect-to-blocked.sub.html]
|
||||
[Expecting logs: ["violated-directive=connect-src"\]]
|
||||
expected: FAIL
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
|
@ -1,4 +1,4 @@
|
|||
[connect-src-eventsource-blocked.sub.html]
|
||||
[Expecting logs: ["Pass","violated-directive=connect-src"\]]
|
||||
expected: FAIL
|
||||
type: testharness
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
|
@ -1,7 +1,6 @@
|
|||
[connect-src-eventsource-redirect-to-blocked.sub.html]
|
||||
type: testharness
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
[Expecting logs: ["PASS EventSource() did not follow the disallowed redirect.","PASS successfullyParsed is true","TEST COMPLETE"\]]
|
||||
expected: FAIL
|
||||
|
||||
[Expecting logs: ["PASS EventSource() did not follow the disallowed redirect.","TEST COMPLETE", "violated-directive=connect-src"\]]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,7 +1,6 @@
|
|||
[connect-src-websocket-blocked.sub.html]
|
||||
type: testharness
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
[WebSocket should fire error event.]
|
||||
expected: FAIL
|
||||
|
||||
[Expecting logs: ["Pass","violated-directive=connect-src"\]]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -6,6 +6,3 @@
|
|||
[XHR should fire onerror after a redirect.]
|
||||
expected: FAIL
|
||||
|
||||
[Expecting logs: ["Pass","violated-directive=connect-src"\]]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,4 +1,3 @@
|
|||
[connect-src-xmlhttprequest-redirect-to-blocked.sub.html]
|
||||
[Expecting logs: ["PASS XMLHttpRequest.send() did not follow the disallowed redirect.","TEST COMPLETE","violated-directive=connect-src"\]]
|
||||
expected: FAIL
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
|
@ -1,4 +1,3 @@
|
|||
[worker-from-guid.sub.html]
|
||||
[Expecting logs: ["violated-directive=connect-src","xhr blocked","TEST COMPLETE"\]]
|
||||
expected: FAIL
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
[font-stylesheet-font-blocked.sub.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
[Test font does not load if it does not match font-src.]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,7 +1,6 @@
|
|||
[form-action-src-blocked.sub.html]
|
||||
type: testharness
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
[form-action-src-blocked]
|
||||
expected: FAIL
|
||||
|
||||
[Expecting logs: ["violated-directive=form-action","TEST COMPLETE"\]]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,7 +1,6 @@
|
|||
[form-action-src-get-blocked.sub.html]
|
||||
type: testharness
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
[form-action-src-allowed]
|
||||
expected: FAIL
|
||||
|
||||
[Expecting logs: ["violated-directive=form-action","TEST COMPLETE"\]]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,7 +1,6 @@
|
|||
[form-action-src-javascript-blocked.sub.html]
|
||||
type: testharness
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
[form-action-src-javascript-blocked]
|
||||
expected: FAIL
|
||||
|
||||
[Expecting logs: ["violated-directive=form-action","TEST COMPLETE"\]]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
[generic-0_10_1.sub.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
[Should fire violation events for every failed violation]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
[generic-0_2_2.sub.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
[Should fire violation events for every failed violation]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
[generic-0_2_3.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
[Should fire violation events for every failed violation]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
[generic-0_8_1.sub.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
[Should fire violation events for every failed violation]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,4 +1,3 @@
|
|||
[report-blocked-data-uri.sub.html]
|
||||
[Expecting logs: ["violated-directive=img-src"\]]
|
||||
expected: FAIL
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
|
@ -1,4 +1,3 @@
|
|||
[object-src-url-blocked.sub.html]
|
||||
[Expecting logs: ["violated-directive=object-src"\]]
|
||||
expected: FAIL
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
|
@ -1,8 +1,5 @@
|
|||
[reporting-api-report-only-sends-reports-on-violation.https.sub.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
[Event is fired]
|
||||
expected: FAIL
|
||||
|
||||
[Violation report status OK.]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
[reporting-api-report-to-overrides-report-uri-1.https.sub.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
[Event is fired]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
[reporting-api-report-to-overrides-report-uri-2.https.sub.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
[Event is fired]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,8 +1,5 @@
|
|||
[reporting-api-sends-reports-on-violation.https.sub.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
[Event is fired]
|
||||
expected: FAIL
|
||||
|
||||
[Violation report status OK.]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,4 +1,3 @@
|
|||
[injected-inline-script-blocked.sub.html]
|
||||
[Expecting logs: ["violated-directive=script-src",\]]
|
||||
expected: FAIL
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
[script-src-1_1.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
[Should not fire policy violation events]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -2,6 +2,4 @@
|
|||
disabled:
|
||||
if os == "win": bug 1172411
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
[Should not fire policy violation events]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -2,6 +2,4 @@
|
|||
disabled:
|
||||
if os == "win": bug 1094323
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
[Test that securitypolicyviolation event is fired]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -3,6 +3,3 @@
|
|||
[eval() should throw without 'unsafe-eval' keyword source in script-src directive.]
|
||||
expected: FAIL
|
||||
|
||||
[Test that securitypolicyviolation event is fired]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -2,6 +2,4 @@
|
|||
disabled:
|
||||
if os == "win": bug 1094323
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
[Test that securitypolicyviolation event is fired]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -3,6 +3,3 @@
|
|||
[Unsafe eval ran in Function() constructor.]
|
||||
expected: FAIL
|
||||
|
||||
[Test that securitypolicyviolation event is fired]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
[script-src-strict_dynamic_discard_whitelist.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
[Whitelisted script without a correct nonce is not allowed with `strict-dynamic`.]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
[script-src-strict_dynamic_double_policy_different_nonce.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
[Unnonced script injected via `appendChild` is not allowed with `strict-dynamic` + a nonce-only double policy.]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,5 +1,4 @@
|
|||
[script-src-strict_dynamic_double_policy_report_only.html]
|
||||
type: testharness
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
[Script injected via `appendChild` is allowed with `strict-dynamic` + Report-Only `script-src 'none'` policy.]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
[script-src-strict_dynamic_javascript_uri.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
[Script injected via `javascript:` URIs are not allowed with `strict-dynamic`.]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
[script-src-strict_dynamic_non_parser_inserted_incorrect_nonce.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
[All the expected CSP violation reports have been fired.]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,30 +1,6 @@
|
|||
[script-src-strict_dynamic_parser_inserted.html]
|
||||
expected: TIMEOUT
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
[Parser-inserted script via `document.write` without a correct nonce is not allowed with `strict-dynamic`.]
|
||||
expected: FAIL
|
||||
|
||||
[Parser-inserted script via `document.writeln` without a correct nonce is not allowed with `strict-dynamic`.]
|
||||
expected: FAIL
|
||||
|
||||
[Parser-inserted deferred script via `document.write` without a correct nonce is not allowed with `strict-dynamic`.]
|
||||
expected: FAIL
|
||||
|
||||
[Parser-inserted deferred script via `document.writeln` without a correct nonce is not allowed with `strict-dynamic`.]
|
||||
expected: FAIL
|
||||
|
||||
[Parser-inserted async script via `document.write` without a correct nonce is not allowed with `strict-dynamic`.]
|
||||
expected: FAIL
|
||||
|
||||
[Parser-inserted async script via `document.writeln` without a correct nonce is not allowed with `strict-dynamic`.]
|
||||
expected: FAIL
|
||||
|
||||
[Parser-inserted deferred async script via `document.write` without a correct nonce is not allowed with `strict-dynamic`.]
|
||||
expected: FAIL
|
||||
|
||||
[Parser-inserted deferred async script via `document.writeln` without a correct nonce is not allowed with `strict-dynamic`.]
|
||||
expected: FAIL
|
||||
|
||||
[Script injected via `innerHTML` is not allowed with `strict-dynamic`.]
|
||||
expected: TIMEOUT
|
||||
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
[scripthash-unicode-normalization.sub.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
[Should fire securitypolicyviolation]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
[scriptnonce-and-scripthash.sub.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
[Expecting alerts: ["PASS (1/3)","PASS (2/3)","PASS (3/3)"\]]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
[scriptnonce-ignore-unsafeinline.sub.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
[Expecting alerts: ["PASS (1/2)","PASS (2/2)", "violated-directive=script-src"\]]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
[securitypolicyviolation-block-image.sub.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
[Non-redirected same-origin URLs are not stripped.]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,11 +1,4 @@
|
|||
[upgrade-insecure-requests-reporting.https.html]
|
||||
expected: TIMEOUT
|
||||
[Upgraded image is reported]
|
||||
expected: TIMEOUT
|
||||
|
||||
[Upgraded iframe is reported]
|
||||
expected: TIMEOUT
|
||||
|
||||
[Navigated iframe is upgraded and reported]
|
||||
expected: TIMEOUT
|
||||
type: testharness
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
|
@ -1,4 +1,3 @@
|
|||
[injected-inline-style-blocked.sub.html]
|
||||
[Expecting logs: ["violated-directive=style-src","PASS"\]]
|
||||
expected: FAIL
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
[inline-style-allowed-while-cloning-objects.sub.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
[Test that violation report event was fired]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,4 +1,3 @@
|
|||
[inline-style-attribute-blocked.sub.html]
|
||||
[Expecting logs: ["violated-directive=style-src","PASS"\]]
|
||||
expected: FAIL
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
|
@ -1,4 +1,3 @@
|
|||
[style-blocked.sub.html]
|
||||
[Expecting logs: ["violated-directive=style-src","PASS"\]]
|
||||
expected: FAIL
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
[style-src-hash-blocked.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
[Should fire a securitypolicyviolation event]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,5 +1,4 @@
|
|||
[style-src-imported-style-blocked.html]
|
||||
type: testharness
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
[Should fire a securitypolicyviolation event]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
[style-src-injected-inline-style-blocked.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
[Should fire a securitypolicyviolation event]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
[style-src-injected-stylesheet-blocked.sub.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
[Should fire a securitypolicyviolation event]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
[style-src-inline-style-attribute-blocked.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
[Should fire a securitypolicyviolation event]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
[style-src-inline-style-blocked.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
[Should fire a securitypolicyviolation event]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,9 +1,6 @@
|
|||
[style-src-inline-style-nonce-blocked-error-event.html]
|
||||
expected: TIMEOUT
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
[Should fire a securitypolicyviolation event]
|
||||
expected: FAIL
|
||||
|
||||
[Test that paragraph remains unmodified and error events received.]
|
||||
expected: NOTRUN
|
||||
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
[style-src-inline-style-nonce-blocked.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
[Should fire a securitypolicyviolation event]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
[style-src-none-blocked.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
[Should fire a securitypolicyviolation event]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
[style-src-stylesheet-nonce-blocked.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
[Should fire a securitypolicyviolation event]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
[stylehash-basic-blocked.sub.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
[Expecting alerts: ["PASS: The 'p' element's text is green, which means the style was correctly applied.", "violated-directive=style-src"\]]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,5 +1,4 @@
|
|||
[stylenonce-allowed.sub.html]
|
||||
type: testharness
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
[Should fire securitypolicyviolation]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,5 +1,4 @@
|
|||
[stylenonce-blocked.sub.html]
|
||||
type: testharness
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
[Should fire securitypolicyviolation]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
[object-in-svg-foreignobject.sub.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
[Should throw a securitypolicyviolation]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,5 +1,3 @@
|
|||
[svg-inline.sub.html]
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
[Should fire violation event]
|
||||
expected: FAIL
|
||||
|
||||
|
|
|
@ -1,4 +1,3 @@
|
|||
[eval-blocked-and-sends-report.sub.html]
|
||||
[Expecting logs: ["PASS: eval() blocked.","violated-directive=script-src"\]]
|
||||
expected: FAIL
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
|
@ -1,4 +1,3 @@
|
|||
[eval-blocked.sub.html]
|
||||
[Expecting logs: ["PASS EvalError","PASS EvalError", "violated-directive=script-src"\]]
|
||||
expected: FAIL
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
|
@ -1,4 +1,3 @@
|
|||
[eval-scripts-setInterval-blocked.sub.html]
|
||||
[Expecting logs: ["PASS","violated-directive=script-src"\]]
|
||||
expected: FAIL
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
|
@ -1,4 +1,3 @@
|
|||
[eval-scripts-setTimeout-blocked.sub.html]
|
||||
[Expecting logs: ["PASS","violated-directive=script-src"\]]
|
||||
expected: FAIL
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
|
@ -1,4 +1,3 @@
|
|||
[function-constructor-blocked.sub.html]
|
||||
[Expecting logs: ["PASS EvalError","violated-directive=script-src"\]]
|
||||
expected: FAIL
|
||||
prefs: [security.csp.enable_violation_events:true]
|
||||
|
||||
|
|
Загрузка…
Ссылка в новой задаче