summaryrefslogtreecommitdiffstats
path: root/testing/web-platform/tests/referrer-policy/same-origin
diff options
context:
space:
mode:
authorMoonchild <moonchild@palemoon.org>2021-02-25 01:03:57 +0000
committerMoonchild <moonchild@palemoon.org>2021-02-25 01:03:57 +0000
commitceadffab6b357723981a429e11222daf6cd6dcfb (patch)
tree5603053048d6a460f79b22bdf165fb74d32d39b0 /testing/web-platform/tests/referrer-policy/same-origin
parent14fb2f966e9b54598c451e3cb35b4aa0480dafed (diff)
parentad5a13bd501e379517da1a944c104a11d951a3f5 (diff)
downloadUXP-RC_20210225.tar
UXP-RC_20210225.tar.gz
UXP-RC_20210225.tar.lz
UXP-RC_20210225.tar.xz
UXP-RC_20210225.zip
Merge branch 'master' into releaseRC_20210225
Diffstat (limited to 'testing/web-platform/tests/referrer-policy/same-origin')
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-origin.keep-origin-redirect.http.html40
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-origin.no-redirect.http.html40
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-origin.swap-origin-redirect.http.html40
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html40
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html40
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html40
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/iframe-tag/cross-origin.keep-origin-redirect.http.html40
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/iframe-tag/cross-origin.no-redirect.http.html40
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/iframe-tag/cross-origin.swap-origin-redirect.http.html40
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/cross-origin.keep-origin-redirect.http.html40
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/cross-origin.no-redirect.http.html40
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/cross-origin.swap-origin-redirect.http.html40
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.keep-origin-redirect.http.html40
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.no-redirect.http.html40
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html40
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/same-origin-insecure.keep-origin-redirect.http.html40
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/same-origin-insecure.no-redirect.http.html40
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/same-origin-insecure.swap-origin-redirect.http.html40
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html40
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-insecure.swap-origin-redirect.http.html40
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.keep-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.keep-origin-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.no-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.no-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.swap-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.swap-origin-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.keep-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.keep-origin-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.no-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.no-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.swap-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.swap-origin-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.keep-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.keep-origin-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.no-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.no-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.swap-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.swap-origin-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.keep-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.keep-origin-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.no-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.no-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.swap-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.swap-origin-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.keep-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.keep-origin-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.no-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.no-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.swap-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.swap-origin-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.keep-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.keep-origin-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.no-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.no-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.swap-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.swap-origin-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.keep-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.keep-origin-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.no-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.no-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.swap-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.swap-origin-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.keep-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.keep-origin-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.no-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.no-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.swap-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.swap-origin-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.keep-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.keep-origin-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.no-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.no-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.swap-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.swap-origin-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.keep-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.keep-origin-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.no-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.no-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.swap-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.swap-origin-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.keep-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.keep-origin-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.no-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.no-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.keep-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.keep-origin-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.no-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.no-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.swap-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.swap-origin-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.keep-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.keep-origin-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.no-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.no-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.swap-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.swap-origin-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.keep-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.keep-origin-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.no-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.no-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.swap-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.swap-origin-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/fetch-request/same-origin-insecure.swap-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/fetch-request/same-origin-insecure.swap-origin-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/img-tag/same-origin-insecure.swap-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/img-tag/same-origin-insecure.swap-origin-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/script-tag/same-origin-insecure.swap-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/script-tag/same-origin-insecure.swap-origin-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/xhr-request/same-origin-insecure.swap-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/xhr-request/same-origin-insecure.swap-origin-redirect.http.html.headers2
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/fetch-request/cross-origin.keep-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/fetch-request/cross-origin.no-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/fetch-request/cross-origin.swap-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/iframe-tag/cross-origin.keep-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/iframe-tag/cross-origin.no-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/iframe-tag/cross-origin.swap-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/script-tag/cross-origin.keep-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/script-tag/cross-origin.no-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/script-tag/cross-origin.swap-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/xhr-request/cross-origin.keep-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/xhr-request/cross-origin.no-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/xhr-request/cross-origin.swap-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/fetch-request/cross-origin.keep-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/fetch-request/cross-origin.no-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/fetch-request/cross-origin.swap-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/iframe-tag/cross-origin.keep-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/iframe-tag/cross-origin.no-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/iframe-tag/cross-origin.swap-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/img-tag/cross-origin.keep-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/img-tag/cross-origin.no-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/img-tag/cross-origin.swap-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/script-tag/cross-origin.keep-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/script-tag/cross-origin.no-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/script-tag/cross-origin.swap-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/xhr-request/cross-origin.keep-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/xhr-request/cross-origin.no-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/xhr-request/cross-origin.swap-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/fetch-request/same-origin-insecure.keep-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/fetch-request/same-origin-insecure.no-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/fetch-request/same-origin-insecure.swap-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.keep-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.no-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/img-tag/same-origin-insecure.keep-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/img-tag/same-origin-insecure.no-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/img-tag/same-origin-insecure.swap-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/script-tag/same-origin-insecure.keep-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/script-tag/same-origin-insecure.no-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/script-tag/same-origin-insecure.swap-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/xhr-request/same-origin-insecure.keep-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/xhr-request/same-origin-insecure.no-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/xhr-request/same-origin-insecure.swap-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/fetch-request/same-origin-insecure.swap-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/img-tag/same-origin-insecure.swap-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/script-tag/same-origin-insecure.swap-origin-redirect.http.html41
-rw-r--r--testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/xhr-request/same-origin-insecure.swap-origin-redirect.http.html41
170 files changed, 0 insertions, 5000 deletions
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-origin.keep-origin-redirect.http.html
deleted file mode 100644
index 14e928ea8..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-origin.keep-origin-redirect.http.html
+++ /dev/null
@@ -1,40 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via iframe-tag using the attr-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "attr-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "subresource_path": "/referrer-policy/generic/subresource/document.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-origin.no-redirect.http.html
deleted file mode 100644
index 0e549ae0d..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-origin.no-redirect.http.html
+++ /dev/null
@@ -1,40 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via iframe-tag using the attr-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "attr-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "subresource_path": "/referrer-policy/generic/subresource/document.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-origin.swap-origin-redirect.http.html
deleted file mode 100644
index ea0d40232..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/iframe-tag/cross-origin.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,40 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via iframe-tag using the attr-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "attr-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "subresource_path": "/referrer-policy/generic/subresource/document.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html
deleted file mode 100644
index 0acf101b8..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html
+++ /dev/null
@@ -1,40 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via img-tag using the attr-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "attr-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "subresource_path": "/referrer-policy/generic/subresource/image.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html
deleted file mode 100644
index 7026fe1d1..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html
+++ /dev/null
@@ -1,40 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via img-tag using the attr-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "attr-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "subresource_path": "/referrer-policy/generic/subresource/image.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html
deleted file mode 100644
index e8bb9ae85..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,40 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via img-tag using the attr-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "attr-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "subresource_path": "/referrer-policy/generic/subresource/image.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/iframe-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/iframe-tag/cross-origin.keep-origin-redirect.http.html
deleted file mode 100644
index 73f992b65..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/iframe-tag/cross-origin.keep-origin-redirect.http.html
+++ /dev/null
@@ -1,40 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via iframe-tag using the attr-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "attr-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "subresource_path": "/referrer-policy/generic/subresource/document.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/iframe-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/iframe-tag/cross-origin.no-redirect.http.html
deleted file mode 100644
index 7fc3541bc..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/iframe-tag/cross-origin.no-redirect.http.html
+++ /dev/null
@@ -1,40 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via iframe-tag using the attr-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "attr-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "subresource_path": "/referrer-policy/generic/subresource/document.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/iframe-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/iframe-tag/cross-origin.swap-origin-redirect.http.html
deleted file mode 100644
index 73ba641f9..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/iframe-tag/cross-origin.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,40 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via iframe-tag using the attr-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "attr-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "subresource_path": "/referrer-policy/generic/subresource/document.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/cross-origin.keep-origin-redirect.http.html
deleted file mode 100644
index 172853a4f..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/cross-origin.keep-origin-redirect.http.html
+++ /dev/null
@@ -1,40 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via img-tag using the attr-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "attr-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "subresource_path": "/referrer-policy/generic/subresource/image.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/cross-origin.no-redirect.http.html
deleted file mode 100644
index b2104f4cb..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/cross-origin.no-redirect.http.html
+++ /dev/null
@@ -1,40 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via img-tag using the attr-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "attr-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "subresource_path": "/referrer-policy/generic/subresource/image.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/cross-origin.swap-origin-redirect.http.html
deleted file mode 100644
index c984c4363..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/cross-origin/http-https/img-tag/cross-origin.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,40 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via img-tag using the attr-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "attr-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "subresource_path": "/referrer-policy/generic/subresource/image.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.keep-origin-redirect.http.html
deleted file mode 100644
index 4cb71bcbf..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.keep-origin-redirect.http.html
+++ /dev/null
@@ -1,40 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the attr-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "attr-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "subresource_path": "/referrer-policy/generic/subresource/document.py",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.no-redirect.http.html
deleted file mode 100644
index 66abd90fd..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.no-redirect.http.html
+++ /dev/null
@@ -1,40 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the attr-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "attr-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "subresource_path": "/referrer-policy/generic/subresource/document.py",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html
deleted file mode 100644
index 7c366c108..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,40 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via iframe-tag using the attr-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "attr-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "subresource_path": "/referrer-policy/generic/subresource/document.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/same-origin-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/same-origin-insecure.keep-origin-redirect.http.html
deleted file mode 100644
index 11683e44b..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/same-origin-insecure.keep-origin-redirect.http.html
+++ /dev/null
@@ -1,40 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via img-tag using the attr-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "attr-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "subresource_path": "/referrer-policy/generic/subresource/image.py",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/same-origin-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/same-origin-insecure.no-redirect.http.html
deleted file mode 100644
index 617093728..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/same-origin-insecure.no-redirect.http.html
+++ /dev/null
@@ -1,40 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via img-tag using the attr-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "attr-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "subresource_path": "/referrer-policy/generic/subresource/image.py",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/same-origin-insecure.swap-origin-redirect.http.html
deleted file mode 100644
index 594c2984d..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-http/img-tag/same-origin-insecure.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,40 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via img-tag using the attr-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "attr-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "subresource_path": "/referrer-policy/generic/subresource/image.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html
deleted file mode 100644
index f17556c54..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-https/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,40 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via iframe-tag using the attr-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "attr-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "subresource_path": "/referrer-policy/generic/subresource/document.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-insecure.swap-origin-redirect.http.html
deleted file mode 100644
index fa91f2cbb..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/attr-referrer/same-origin/http-https/img-tag/same-origin-insecure.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,40 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via img-tag using the attr-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "attr-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "subresource_path": "/referrer-policy/generic/subresource/image.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.keep-origin-redirect.http.html
deleted file mode 100644
index 18dba0048..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.keep-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.keep-origin-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.keep-origin-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.no-redirect.http.html
deleted file mode 100644
index 9d8b2b2c4..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.no-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.no-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.no-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.swap-origin-redirect.http.html
deleted file mode 100644
index 2befacac7..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.swap-origin-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/fetch-request/cross-origin.swap-origin-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.keep-origin-redirect.http.html
deleted file mode 100644
index 988c99d5c..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.keep-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "subresource_path": "/referrer-policy/generic/subresource/document.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.keep-origin-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.keep-origin-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.no-redirect.http.html
deleted file mode 100644
index 7588d84e0..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.no-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "subresource_path": "/referrer-policy/generic/subresource/document.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.no-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.no-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.swap-origin-redirect.http.html
deleted file mode 100644
index 3e2b36979..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "subresource_path": "/referrer-policy/generic/subresource/document.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.swap-origin-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/iframe-tag/cross-origin.swap-origin-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html
deleted file mode 100644
index b26c3efdc..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "subresource_path": "/referrer-policy/generic/subresource/image.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html
deleted file mode 100644
index c7c348f90..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "subresource_path": "/referrer-policy/generic/subresource/image.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html
deleted file mode 100644
index 126e278b4..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "subresource_path": "/referrer-policy/generic/subresource/image.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.keep-origin-redirect.http.html
deleted file mode 100644
index f22d6d87b..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.keep-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "subresource_path": "/referrer-policy/generic/subresource/script.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.keep-origin-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.keep-origin-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.no-redirect.http.html
deleted file mode 100644
index 90dd8881d..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.no-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "subresource_path": "/referrer-policy/generic/subresource/script.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.no-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.no-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.swap-origin-redirect.http.html
deleted file mode 100644
index 8dd055d71..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "subresource_path": "/referrer-policy/generic/subresource/script.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.swap-origin-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/script-tag/cross-origin.swap-origin-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.keep-origin-redirect.http.html
deleted file mode 100644
index 32248c739..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.keep-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.keep-origin-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.keep-origin-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.no-redirect.http.html
deleted file mode 100644
index 4e41494b8..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.no-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.no-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.no-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.swap-origin-redirect.http.html
deleted file mode 100644
index 08973c571..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.swap-origin-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-http/xhr-request/cross-origin.swap-origin-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.keep-origin-redirect.http.html
deleted file mode 100644
index 863791529..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.keep-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.keep-origin-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.keep-origin-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.no-redirect.http.html
deleted file mode 100644
index 1e66182f0..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.no-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.no-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.no-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.swap-origin-redirect.http.html
deleted file mode 100644
index 289a4a507..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.swap-origin-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/fetch-request/cross-origin.swap-origin-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.keep-origin-redirect.http.html
deleted file mode 100644
index 4d44a10b7..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.keep-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "subresource_path": "/referrer-policy/generic/subresource/document.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.keep-origin-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.keep-origin-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.no-redirect.http.html
deleted file mode 100644
index d76ff641a..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.no-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "subresource_path": "/referrer-policy/generic/subresource/document.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.no-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.no-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.swap-origin-redirect.http.html
deleted file mode 100644
index 37d4e3e46..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "subresource_path": "/referrer-policy/generic/subresource/document.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.swap-origin-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/iframe-tag/cross-origin.swap-origin-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.keep-origin-redirect.http.html
deleted file mode 100644
index 2757dabaa..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.keep-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "subresource_path": "/referrer-policy/generic/subresource/image.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.keep-origin-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.keep-origin-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.no-redirect.http.html
deleted file mode 100644
index 8a405470c..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.no-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "subresource_path": "/referrer-policy/generic/subresource/image.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.no-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.no-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.swap-origin-redirect.http.html
deleted file mode 100644
index f5c690b8b..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "subresource_path": "/referrer-policy/generic/subresource/image.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.swap-origin-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/img-tag/cross-origin.swap-origin-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.keep-origin-redirect.http.html
deleted file mode 100644
index ba1424c06..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.keep-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "subresource_path": "/referrer-policy/generic/subresource/script.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.keep-origin-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.keep-origin-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.no-redirect.http.html
deleted file mode 100644
index 7aebb65a5..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.no-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "subresource_path": "/referrer-policy/generic/subresource/script.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.no-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.no-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.swap-origin-redirect.http.html
deleted file mode 100644
index 8d145be6b..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "subresource_path": "/referrer-policy/generic/subresource/script.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.swap-origin-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/script-tag/cross-origin.swap-origin-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.keep-origin-redirect.http.html
deleted file mode 100644
index 6d334876d..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.keep-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.keep-origin-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.keep-origin-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.no-redirect.http.html
deleted file mode 100644
index 941dd867f..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.no-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.no-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.no-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.swap-origin-redirect.http.html
deleted file mode 100644
index 41e0570ec..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.swap-origin-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/cross-origin/http-https/xhr-request/cross-origin.swap-origin-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.keep-origin-redirect.http.html
deleted file mode 100644
index 8f72529b6..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.keep-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.keep-origin-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.keep-origin-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.no-redirect.http.html
deleted file mode 100644
index 36e5d0a32..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.no-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.no-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.no-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.swap-origin-redirect.http.html
deleted file mode 100644
index 87cc41497..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via fetch-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.swap-origin-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/fetch-request/same-origin-insecure.swap-origin-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.keep-origin-redirect.http.html
deleted file mode 100644
index 41d8f63f2..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.keep-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "subresource_path": "/referrer-policy/generic/subresource/document.py",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.keep-origin-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.keep-origin-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.no-redirect.http.html
deleted file mode 100644
index e9082a803..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.no-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "subresource_path": "/referrer-policy/generic/subresource/document.py",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.no-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.no-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html
deleted file mode 100644
index 731cb6339..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via iframe-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "subresource_path": "/referrer-policy/generic/subresource/document.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.keep-origin-redirect.http.html
deleted file mode 100644
index 94a1ceca8..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.keep-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "subresource_path": "/referrer-policy/generic/subresource/image.py",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.keep-origin-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.keep-origin-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.no-redirect.http.html
deleted file mode 100644
index 0e0fc8e5b..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.no-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "subresource_path": "/referrer-policy/generic/subresource/image.py",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.no-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.no-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.swap-origin-redirect.http.html
deleted file mode 100644
index b5f8a4cbd..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via img-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "subresource_path": "/referrer-policy/generic/subresource/image.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.swap-origin-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/img-tag/same-origin-insecure.swap-origin-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.keep-origin-redirect.http.html
deleted file mode 100644
index bbc8f26a5..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.keep-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "subresource_path": "/referrer-policy/generic/subresource/script.py",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.keep-origin-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.keep-origin-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.no-redirect.http.html
deleted file mode 100644
index d373139d1..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.no-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "subresource_path": "/referrer-policy/generic/subresource/script.py",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.no-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.no-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.swap-origin-redirect.http.html
deleted file mode 100644
index 49468d125..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via script-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "subresource_path": "/referrer-policy/generic/subresource/script.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.swap-origin-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/script-tag/same-origin-insecure.swap-origin-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.keep-origin-redirect.http.html
deleted file mode 100644
index c3be3878e..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.keep-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.keep-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.keep-origin-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.keep-origin-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.no-redirect.http.html
deleted file mode 100644
index f4800516d..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.no-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.no-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.no-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.no-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.swap-origin-redirect.http.html
deleted file mode 100644
index ce60482bd..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via xhr-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.swap-origin-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-http/xhr-request/same-origin-insecure.swap-origin-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/fetch-request/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/fetch-request/same-origin-insecure.swap-origin-redirect.http.html
deleted file mode 100644
index 5714a7e06..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/fetch-request/same-origin-insecure.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via fetch-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/fetch-request/same-origin-insecure.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/fetch-request/same-origin-insecure.swap-origin-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/fetch-request/same-origin-insecure.swap-origin-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html
deleted file mode 100644
index ca5c1fd4b..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via iframe-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "subresource_path": "/referrer-policy/generic/subresource/document.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/img-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/img-tag/same-origin-insecure.swap-origin-redirect.http.html
deleted file mode 100644
index 934fb53a6..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/img-tag/same-origin-insecure.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via img-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "subresource_path": "/referrer-policy/generic/subresource/image.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/img-tag/same-origin-insecure.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/img-tag/same-origin-insecure.swap-origin-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/img-tag/same-origin-insecure.swap-origin-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/script-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/script-tag/same-origin-insecure.swap-origin-redirect.http.html
deleted file mode 100644
index 755075a17..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/script-tag/same-origin-insecure.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via script-tag using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "subresource_path": "/referrer-policy/generic/subresource/script.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/script-tag/same-origin-insecure.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/script-tag/same-origin-insecure.swap-origin-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/script-tag/same-origin-insecure.swap-origin-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/xhr-request/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/xhr-request/same-origin-insecure.swap-origin-redirect.http.html
deleted file mode 100644
index 56c1bdb7d..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/xhr-request/same-origin-insecure.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <!-- No meta: Referrer policy delivered via HTTP headers. -->
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via xhr-request using the http-rp
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "http-rp",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/xhr-request/same-origin-insecure.swap-origin-redirect.http.html.headers b/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/xhr-request/same-origin-insecure.swap-origin-redirect.http.html.headers
deleted file mode 100644
index 309da8091..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/http-rp/same-origin/http-https/xhr-request/same-origin-insecure.swap-origin-redirect.http.html.headers
+++ /dev/null
@@ -1,2 +0,0 @@
-Referrer-Policy: same-origin
-Access-Control-Allow-Origin: *
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/fetch-request/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/fetch-request/cross-origin.keep-origin-redirect.http.html
deleted file mode 100644
index 986434466..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/fetch-request/cross-origin.keep-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/fetch-request/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/fetch-request/cross-origin.no-redirect.http.html
deleted file mode 100644
index a70bbb7ff..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/fetch-request/cross-origin.no-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/fetch-request/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/fetch-request/cross-origin.swap-origin-redirect.http.html
deleted file mode 100644
index 2199fbacc..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/fetch-request/cross-origin.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/iframe-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/iframe-tag/cross-origin.keep-origin-redirect.http.html
deleted file mode 100644
index 0038a1a78..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/iframe-tag/cross-origin.keep-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "subresource_path": "/referrer-policy/generic/subresource/document.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/iframe-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/iframe-tag/cross-origin.no-redirect.http.html
deleted file mode 100644
index 8555bc6cc..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/iframe-tag/cross-origin.no-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "subresource_path": "/referrer-policy/generic/subresource/document.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/iframe-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/iframe-tag/cross-origin.swap-origin-redirect.http.html
deleted file mode 100644
index bd2014b06..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/iframe-tag/cross-origin.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "subresource_path": "/referrer-policy/generic/subresource/document.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html
deleted file mode 100644
index b519ebcfb..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.keep-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via img-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "subresource_path": "/referrer-policy/generic/subresource/image.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html
deleted file mode 100644
index a70f22d69..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.no-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via img-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "subresource_path": "/referrer-policy/generic/subresource/image.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html
deleted file mode 100644
index 633938985..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/img-tag/cross-origin.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via img-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "subresource_path": "/referrer-policy/generic/subresource/image.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/script-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/script-tag/cross-origin.keep-origin-redirect.http.html
deleted file mode 100644
index b9eefbc30..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/script-tag/cross-origin.keep-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "subresource_path": "/referrer-policy/generic/subresource/script.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/script-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/script-tag/cross-origin.no-redirect.http.html
deleted file mode 100644
index 82fc3b114..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/script-tag/cross-origin.no-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "subresource_path": "/referrer-policy/generic/subresource/script.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/script-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/script-tag/cross-origin.swap-origin-redirect.http.html
deleted file mode 100644
index bbcbe233f..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/script-tag/cross-origin.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "subresource_path": "/referrer-policy/generic/subresource/script.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/xhr-request/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/xhr-request/cross-origin.keep-origin-redirect.http.html
deleted file mode 100644
index fd270955f..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/xhr-request/cross-origin.keep-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/xhr-request/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/xhr-request/cross-origin.no-redirect.http.html
deleted file mode 100644
index 4739c5847..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/xhr-request/cross-origin.no-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/xhr-request/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/xhr-request/cross-origin.swap-origin-redirect.http.html
deleted file mode 100644
index fe6f02837..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-http/xhr-request/cross-origin.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/fetch-request/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/fetch-request/cross-origin.keep-origin-redirect.http.html
deleted file mode 100644
index 5d0f8168c..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/fetch-request/cross-origin.keep-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/fetch-request/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/fetch-request/cross-origin.no-redirect.http.html
deleted file mode 100644
index 3a4fb95e8..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/fetch-request/cross-origin.no-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/fetch-request/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/fetch-request/cross-origin.swap-origin-redirect.http.html
deleted file mode 100644
index 20c2f4f49..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/fetch-request/cross-origin.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/iframe-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/iframe-tag/cross-origin.keep-origin-redirect.http.html
deleted file mode 100644
index d3ad1f9c4..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/iframe-tag/cross-origin.keep-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "subresource_path": "/referrer-policy/generic/subresource/document.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/iframe-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/iframe-tag/cross-origin.no-redirect.http.html
deleted file mode 100644
index 5de6a24aa..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/iframe-tag/cross-origin.no-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "subresource_path": "/referrer-policy/generic/subresource/document.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/iframe-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/iframe-tag/cross-origin.swap-origin-redirect.http.html
deleted file mode 100644
index d39c95d82..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/iframe-tag/cross-origin.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "subresource_path": "/referrer-policy/generic/subresource/document.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/img-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/img-tag/cross-origin.keep-origin-redirect.http.html
deleted file mode 100644
index df9f3a839..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/img-tag/cross-origin.keep-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via img-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "subresource_path": "/referrer-policy/generic/subresource/image.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/img-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/img-tag/cross-origin.no-redirect.http.html
deleted file mode 100644
index 729839842..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/img-tag/cross-origin.no-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via img-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "subresource_path": "/referrer-policy/generic/subresource/image.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/img-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/img-tag/cross-origin.swap-origin-redirect.http.html
deleted file mode 100644
index f5e5c5230..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/img-tag/cross-origin.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via img-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "subresource_path": "/referrer-policy/generic/subresource/image.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/script-tag/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/script-tag/cross-origin.keep-origin-redirect.http.html
deleted file mode 100644
index 5e03688c4..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/script-tag/cross-origin.keep-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "subresource_path": "/referrer-policy/generic/subresource/script.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/script-tag/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/script-tag/cross-origin.no-redirect.http.html
deleted file mode 100644
index 346e401ef..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/script-tag/cross-origin.no-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "subresource_path": "/referrer-policy/generic/subresource/script.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/script-tag/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/script-tag/cross-origin.swap-origin-redirect.http.html
deleted file mode 100644
index 27d89b3c0..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/script-tag/cross-origin.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "subresource_path": "/referrer-policy/generic/subresource/script.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/xhr-request/cross-origin.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/xhr-request/cross-origin.keep-origin-redirect.http.html
deleted file mode 100644
index 045dc0617..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/xhr-request/cross-origin.keep-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/xhr-request/cross-origin.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/xhr-request/cross-origin.no-redirect.http.html
deleted file mode 100644
index aadf71777..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/xhr-request/cross-origin.no-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/xhr-request/cross-origin.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/xhr-request/cross-origin.swap-origin-redirect.http.html
deleted file mode 100644
index aada3951f..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/cross-origin/http-https/xhr-request/cross-origin.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is cross-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "cross-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/fetch-request/same-origin-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/fetch-request/same-origin-insecure.keep-origin-redirect.http.html
deleted file mode 100644
index 9bbbfb72f..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/fetch-request/same-origin-insecure.keep-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/fetch-request/same-origin-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/fetch-request/same-origin-insecure.no-redirect.http.html
deleted file mode 100644
index 6d7a54cdb..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/fetch-request/same-origin-insecure.no-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/fetch-request/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/fetch-request/same-origin-insecure.swap-origin-redirect.http.html
deleted file mode 100644
index 8117e29c0..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/fetch-request/same-origin-insecure.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via fetch-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "fetch-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.keep-origin-redirect.http.html
deleted file mode 100644
index 34859ed87..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.keep-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "subresource_path": "/referrer-policy/generic/subresource/document.py",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.no-redirect.http.html
deleted file mode 100644
index e73908952..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.no-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "subresource_path": "/referrer-policy/generic/subresource/document.py",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html
deleted file mode 100644
index 0080977a7..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via iframe-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "iframe-tag",
- "subresource_path": "/referrer-policy/generic/subresource/document.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/img-tag/same-origin-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/img-tag/same-origin-insecure.keep-origin-redirect.http.html
deleted file mode 100644
index 155bf0109..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/img-tag/same-origin-insecure.keep-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via img-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "subresource_path": "/referrer-policy/generic/subresource/image.py",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/img-tag/same-origin-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/img-tag/same-origin-insecure.no-redirect.http.html
deleted file mode 100644
index 7b3442d29..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/img-tag/same-origin-insecure.no-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via img-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "subresource_path": "/referrer-policy/generic/subresource/image.py",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/img-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/img-tag/same-origin-insecure.swap-origin-redirect.http.html
deleted file mode 100644
index fe2b40c58..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/img-tag/same-origin-insecure.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via img-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "img-tag",
- "subresource_path": "/referrer-policy/generic/subresource/image.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/script-tag/same-origin-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/script-tag/same-origin-insecure.keep-origin-redirect.http.html
deleted file mode 100644
index 18f3dbc80..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/script-tag/same-origin-insecure.keep-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "subresource_path": "/referrer-policy/generic/subresource/script.py",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/script-tag/same-origin-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/script-tag/same-origin-insecure.no-redirect.http.html
deleted file mode 100644
index f296512ef..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/script-tag/same-origin-insecure.no-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "subresource_path": "/referrer-policy/generic/subresource/script.py",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/script-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/script-tag/same-origin-insecure.swap-origin-redirect.http.html
deleted file mode 100644
index 8eaeb5cd8..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/script-tag/same-origin-insecure.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via script-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "script-tag",
- "subresource_path": "/referrer-policy/generic/subresource/script.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/xhr-request/same-origin-insecure.keep-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/xhr-request/same-origin-insecure.keep-origin-redirect.http.html
deleted file mode 100644
index 9ca451221..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/xhr-request/same-origin-insecure.keep-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with keep-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "keep-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/xhr-request/same-origin-insecure.no-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/xhr-request/same-origin-insecure.no-redirect.http.html
deleted file mode 100644
index a8ec1e6ac..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/xhr-request/same-origin-insecure.no-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is stripped-referrer when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with no-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "no-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "stripped-referrer"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/xhr-request/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/xhr-request/same-origin-insecure.swap-origin-redirect.http.html
deleted file mode 100644
index 5fdacce40..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-http/xhr-request/same-origin-insecure.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an http
- sub-resource via xhr-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "http",
- "subresource": "xhr-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/fetch-request/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/fetch-request/same-origin-insecure.swap-origin-redirect.http.html
deleted file mode 100644
index cac271986..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/fetch-request/same-origin-insecure.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via fetch-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "fetch-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html
deleted file mode 100644
index 7023a52be..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/iframe-tag/same-origin-insecure.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via iframe-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "iframe-tag",
- "subresource_path": "/referrer-policy/generic/subresource/document.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/img-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/img-tag/same-origin-insecure.swap-origin-redirect.http.html
deleted file mode 100644
index a6be79bcd..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/img-tag/same-origin-insecure.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via img-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "img-tag",
- "subresource_path": "/referrer-policy/generic/subresource/image.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/script-tag/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/script-tag/same-origin-insecure.swap-origin-redirect.http.html
deleted file mode 100644
index 70602133f..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/script-tag/same-origin-insecure.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via script-tag using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "script-tag",
- "subresource_path": "/referrer-policy/generic/subresource/script.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>
diff --git a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/xhr-request/same-origin-insecure.swap-origin-redirect.http.html b/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/xhr-request/same-origin-insecure.swap-origin-redirect.http.html
deleted file mode 100644
index 27a95b7ad..000000000
--- a/testing/web-platform/tests/referrer-policy/same-origin/meta-referrer/same-origin/http-https/xhr-request/same-origin-insecure.swap-origin-redirect.http.html
+++ /dev/null
@@ -1,41 +0,0 @@
-<!DOCTYPE html>
-<!-- DO NOT EDIT! Generated by referrer-policy/generic/tools/generate.py using referrer-policy/generic/template/test.release.html.template. -->
-<html>
- <head>
- <title>Referrer-Policy: Referrer Policy is set to 'same-origin'</title>
- <meta name="description" content="Check that cross-origin subresources get no referrer information and same-origin get the stripped referrer URL.">
- <meta name="referrer" content="same-origin">
- <link rel="author" title="Kristijan Burnik" href="burnik@chromium.org">
- <link rel="help" href="https://w3c.github.io/webappsec-referrer-policy/#referrer-policy-same-origin">
- <meta name="assert" content="The referrer URL is omitted when a
- document served over http requires an https
- sub-resource via xhr-request using the meta-referrer
- delivery method with swap-origin-redirect and when
- the target request is same-origin.">
- <script src="/resources/testharness.js"></script>
- <script src="/resources/testharnessreport.js"></script>
- <!-- TODO(kristijanburnik): Minify and merge both: -->
- <script src="/referrer-policy/generic/common.js"></script>
- <script src="/referrer-policy/generic/referrer-policy-test-case.js?pipe=sub"></script>
- </head>
- <body>
- <script>
- ReferrerPolicyTestCase(
- {
- "referrer_policy": "same-origin",
- "delivery_method": "meta-referrer",
- "redirection": "swap-origin-redirect",
- "origin": "same-origin",
- "source_protocol": "http",
- "target_protocol": "https",
- "subresource": "xhr-request",
- "subresource_path": "/referrer-policy/generic/subresource/xhr.py",
- "referrer_url": "omitted"
- },
- document.querySelector("meta[name=assert]").content,
- new SanityChecker()
- ).start();
- </script>
- <div id="log"></div>
- </body>
-</html>