Skip to content
This repository was archived by the owner on Mar 19, 2021. It is now read-only.

Commit afcf0c8

Browse files
hiroshige-gfoolip
authored andcommitted
[WPT/upgrade-insecure-requests] Regenerate files
Follow-up of https://chromium-review.googlesource.com/c/chromium/src/+/1788551. - Generate gen/ files (mechanical) - Remove old test files - Update TestExpectations (manual) - Added crbug.com/1001374 lines, as this CL adds test coverage for <iframe src="(mixed-content)"> inside <iframe src=""> that is affected by crbug.com/1001374. Bug: 1001422, 1001374, 917554 Change-Id: I17dae578b18b943c5962222f2e0e2c81e6190aa6 Reviewed-on: https://chromium-review.googlesource.com/c/chromium/src/+/1788553 Commit-Queue: Hiroshige Hayashizaki <[email protected]> Reviewed-by: Kenichi Ishibashi <[email protected]> Reviewed-by: Hiroki Nakagawa <[email protected]> Cr-Commit-Position: refs/heads/master@{#703184}
1 parent 28cbc22 commit afcf0c8

File tree

766 files changed

+24424
-501
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

766 files changed

+24424
-501
lines changed

upgrade-insecure-requests/animation-worklet-import-upgrade.https.html

Lines changed: 0 additions & 19 deletions
This file was deleted.

upgrade-insecure-requests/animation-worklet-redirect-upgrade.https.html

Lines changed: 0 additions & 19 deletions
This file was deleted.

upgrade-insecure-requests/animation-worklet-upgrade.https.html

Lines changed: 0 additions & 19 deletions
This file was deleted.

upgrade-insecure-requests/audio-worklet-import-upgrade.https.html

Lines changed: 0 additions & 19 deletions
This file was deleted.

upgrade-insecure-requests/audio-worklet-redirect-upgrade.https.html

Lines changed: 0 additions & 19 deletions
This file was deleted.

upgrade-insecure-requests/audio-worklet-upgrade.https.html

Lines changed: 0 additions & 19 deletions
This file was deleted.
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
<!DOCTYPE html>
2+
<!-- DO NOT EDIT! Generated by upgrade-insecure-requests/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
3+
<html>
4+
<head>
5+
<title>Upgrade-Insecure-Requests: No upgrade-insecure-request</title>
6+
<meta charset='utf-8'>
7+
<meta name="description" content="No upgrade-insecure-request">
8+
<link rel="author" title="Kristijan Burnik" href="[email protected]">
9+
<link rel="help" href="https://w3c.github.io/webappsec-upgrade-insecure-requests/">
10+
<meta name="assert" content="Upgrade-Insecure-Requests: Expects blocked for fetch to cross-http-downgrade origin and downgrade redirection from https context.">
11+
<script src="/resources/testharness.js"></script>
12+
<script src="/resources/testharnessreport.js"></script>
13+
<script src="/common/security-features/resources/common.sub.js"></script>
14+
<script src="/upgrade-insecure-requests/generic/test-case.sub.js"></script>
15+
</head>
16+
<body>
17+
<script>
18+
TestCase(
19+
{
20+
"expectation": "blocked",
21+
"origin": "cross-http-downgrade",
22+
"redirection": "downgrade",
23+
"source_context_list": [
24+
{
25+
"policyDeliveries": [],
26+
"sourceContextType": "iframe-blank"
27+
}
28+
],
29+
"source_scheme": "https",
30+
"subresource": "fetch",
31+
"subresource_policy_deliveries": []
32+
},
33+
document.querySelector("meta[name=assert]").content,
34+
new SanityChecker()
35+
).start();
36+
</script>
37+
<div id="log"></div>
38+
</body>
39+
</html>
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
<!DOCTYPE html>
2+
<!-- DO NOT EDIT! Generated by upgrade-insecure-requests/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
3+
<html>
4+
<head>
5+
<title>Upgrade-Insecure-Requests: No upgrade-insecure-request</title>
6+
<meta charset='utf-8'>
7+
<meta name="description" content="No upgrade-insecure-request">
8+
<link rel="author" title="Kristijan Burnik" href="[email protected]">
9+
<link rel="help" href="https://w3c.github.io/webappsec-upgrade-insecure-requests/">
10+
<meta name="assert" content="Upgrade-Insecure-Requests: Expects blocked for fetch to cross-http-downgrade origin and no-redirect redirection from https context.">
11+
<script src="/resources/testharness.js"></script>
12+
<script src="/resources/testharnessreport.js"></script>
13+
<script src="/common/security-features/resources/common.sub.js"></script>
14+
<script src="/upgrade-insecure-requests/generic/test-case.sub.js"></script>
15+
</head>
16+
<body>
17+
<script>
18+
TestCase(
19+
{
20+
"expectation": "blocked",
21+
"origin": "cross-http-downgrade",
22+
"redirection": "no-redirect",
23+
"source_context_list": [
24+
{
25+
"policyDeliveries": [],
26+
"sourceContextType": "iframe-blank"
27+
}
28+
],
29+
"source_scheme": "https",
30+
"subresource": "fetch",
31+
"subresource_policy_deliveries": []
32+
},
33+
document.querySelector("meta[name=assert]").content,
34+
new SanityChecker()
35+
).start();
36+
</script>
37+
<div id="log"></div>
38+
</body>
39+
</html>
Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
<!DOCTYPE html>
2+
<!-- DO NOT EDIT! Generated by upgrade-insecure-requests/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
3+
<html>
4+
<head>
5+
<title>Upgrade-Insecure-Requests: No upgrade-insecure-request</title>
6+
<meta charset='utf-8'>
7+
<meta name="description" content="No upgrade-insecure-request">
8+
<link rel="author" title="Kristijan Burnik" href="[email protected]">
9+
<link rel="help" href="https://w3c.github.io/webappsec-upgrade-insecure-requests/">
10+
<meta name="assert" content="Upgrade-Insecure-Requests: Expects blocked for fetch to cross-https origin and downgrade redirection from https context.">
11+
<script src="/resources/testharness.js"></script>
12+
<script src="/resources/testharnessreport.js"></script>
13+
<script src="/common/security-features/resources/common.sub.js"></script>
14+
<script src="/upgrade-insecure-requests/generic/test-case.sub.js"></script>
15+
</head>
16+
<body>
17+
<script>
18+
TestCase(
19+
{
20+
"expectation": "blocked",
21+
"origin": "cross-https",
22+
"redirection": "downgrade",
23+
"source_context_list": [
24+
{
25+
"policyDeliveries": [],
26+
"sourceContextType": "iframe-blank"
27+
}
28+
],
29+
"source_scheme": "https",
30+
"subresource": "fetch",
31+
"subresource_policy_deliveries": []
32+
},
33+
document.querySelector("meta[name=assert]").content,
34+
new SanityChecker()
35+
).start();
36+
</script>
37+
<div id="log"></div>
38+
</body>
39+
</html>
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
<!DOCTYPE html>
2+
<!-- DO NOT EDIT! Generated by upgrade-insecure-requests/generic/tools/generate.py using common/security-features/tools/template/test.release.html.template. -->
3+
<html>
4+
<head>
5+
<title>Upgrade-Insecure-Requests: No upgrade-insecure-request</title>
6+
<meta charset='utf-8'>
7+
<meta name="description" content="No upgrade-insecure-request">
8+
<link rel="author" title="Kristijan Burnik" href="[email protected]">
9+
<link rel="help" href="https://w3c.github.io/webappsec-upgrade-insecure-requests/">
10+
<meta name="assert" content="Upgrade-Insecure-Requests: Expects blocked for fetch to same-http-downgrade origin and downgrade redirection from https context.">
11+
<script src="/resources/testharness.js"></script>
12+
<script src="/resources/testharnessreport.js"></script>
13+
<script src="/common/security-features/resources/common.sub.js"></script>
14+
<script src="/upgrade-insecure-requests/generic/test-case.sub.js"></script>
15+
</head>
16+
<body>
17+
<script>
18+
TestCase(
19+
{
20+
"expectation": "blocked",
21+
"origin": "same-http-downgrade",
22+
"redirection": "downgrade",
23+
"source_context_list": [
24+
{
25+
"policyDeliveries": [],
26+
"sourceContextType": "iframe-blank"
27+
}
28+
],
29+
"source_scheme": "https",
30+
"subresource": "fetch",
31+
"subresource_policy_deliveries": []
32+
},
33+
document.querySelector("meta[name=assert]").content,
34+
new SanityChecker()
35+
).start();
36+
</script>
37+
<div id="log"></div>
38+
</body>
39+
</html>

0 commit comments

Comments
 (0)